Page 68 of 364 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in the pagedata subsystem of the process file system (/proc) in Solaris 8 through 10 allows local users to cause a denial of service (system hang or panic) via unknown attack vectors that cause cause the kmem_oversize arena to allocate a large amount of system memory that does not get freed. • http://secunia.com/advisories/19128 http://secunia.com/advisories/19716 http://securitytracker.com/id?1015723 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102159-1 http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm http://www.securityfocus.com/bid/16966 http://www.vupen.com/english/advisories/2006/0829 https://exchange.xforce.ibmcloud.com/vulnerabilities/25152 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1618 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in the hsfs filesystem in Solaris 8, 9, and 10 allows unspecified attackers to cause a denial of service (panic) or execute arbitrary code. • http://secunia.com/advisories/19042 http://securitytracker.com/id?1015680 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102161-1 http://www.securityfocus.com/bid/16826 http://www.vupen.com/english/advisories/2006/0756 https://exchange.xforce.ibmcloud.com/vulnerabilities/24911 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1628 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in in.rexecd in Solaris 10 allows local users to gain privileges on Kerberos systems via unknown attack vectors. • http://secunia.com/advisories/18891 http://securitytracker.com/id?1015635 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102186-1 http://www.ciac.org/ciac/bulletins/q-126.shtml http://www.securityfocus.com/bid/16658 http://www.vupen.com/english/advisories/2006/0608 https://exchange.xforce.ibmcloud.com/vulnerabilities/24680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1580 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

pkgadd in Sun Solaris 10 before 20060825 installs files with insecure file and directory permissions (755 or 777) if the pkgmap file contains a "?" (question mark) in the mode field, which allows local users to modify arbitrary files or directories, a different vulnerability than CVE-2002-1871. pkgadd en Sun Solaris 10 anterior al 25/08/2006 instala archivos con permisos de archivo y directorio no seguros (755 ó 777) si el fichero pkgmap contiene un "?" (cierre de interrogación) en el modo field, lo cual permite a usuarios locales modificar archivos o directorios de su elección, una vulnerabilidad diferente que CVE-2002-1871. • http://secunia.com/advisories/21633 http://secunia.com/advisories/22992 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102513-1 http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm http://www.osvdb.org/28203 http://www.securityfocus.com/bid/19730 http://www.vupen.com/english/advisories/2006/3397 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2010 •