Page 6 of 83 results (0.012 seconds)

CVSS: 7.2EPSS: 0%CPEs: 30EXPL: 1

The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 http://marc.info/?l=bugtraq&m=94935300520617&w=2 •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 1

rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 http://marc.info/?l=bugtraq&m=91547759121289&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba http://www.cert.org/advisories/CA-99-05-statd-automountd.html http://www.ciac.org/ciac/bulletins/j-045.shtml http://www.securityfocus.com/bid/450 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Solaris syslogd crashes when receiving a message from a host that doesn't have an inverse DNS entry. • http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?patchid=103291&collection=fpatches http://www.securityfocus.com/bid/1878 •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files. • http://www.securityfocus.com/bid/165 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

The passwd command in Solaris can be subjected to a denial of service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/182 •