Page 67 of 391 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Command execution in Sun systems via buffer overflow in the at program. Ejecución de comandos en sistemas Sun mediante desbordamiento de tampón en el programa 'at' • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033 •

CVSS: 7.5EPSS: 3%CPEs: 7EXPL: 0

Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/142 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 3

Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. • https://www.exploit-db.com/exploits/332 https://www.exploit-db.com/exploits/19160 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.18.solaris.chkey.buffer.overflow.vul http://marc.info/?l=bugtraq&m=87602167418335&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/144 http://www.iss.net/security_center/static/7442.php http://www.securityfocus.com/bid/207 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

SunOS 4.1.4 on a Sparc 20 machine allows local users to cause a denial of service (kernel panic) by reading from the /dev/tcx0 TCX device. • http://oamk.fi/~jukkao/bugtraq/before-971202/0498.html http://www.insecure.org/sploits/sunos.dev.tcx0.write.wierd.shit.to.device.bug.html •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 2

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •