Page 7 of 143 results (0.010 seconds)

CVSS: 7.5EPSS: 2%CPEs: 4EXPL: 0

07 Mar 2002 — cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request. cachefsd en Solaris 2.6, 7 y 8 permite a atacantes remotos causar una denegación de servicio (caída) mediante una llamada a procedimiento inválida en una petición RPC. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0047.html •

CVSS: 7.8EPSS: 4%CPEs: 4EXPL: 0

07 Mar 2002 — Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument. Desbordamiento de Buffer en cachefsd en Solaris 2.6, 7 y 8 permite a usarios locales ganar privilegios de root mediante un argumento de mount largo. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00416.html •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

07 Mar 2002 — Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file. Desbordamiento de buffer en admintools en Solarios 2.5 a 8 permite a usuarios locales ganar privilegios de root mediante argumentos largos ala opción de línea de comandos -del argumento PRODVERS en el fichero .cdtoc. • http://online.securityfocus.com/archive/1/270122 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

07 Mar 2002 — Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path. Desbordamiento de buffer en admintool en Solaris 2.6, 7 y 8 permite a usuarios locales ganar privilegios de root mediante una ruta de instalación de medio larga. • http://www.esecurityonline.com/advisories/eSO4123.asp •

CVSS: 5.3EPSS: 0%CPEs: 16EXPL: 0

31 Dec 2001 — The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host. • http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0016.html •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

12 Dec 2001 — Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 •

CVSS: 10.0EPSS: 74%CPEs: 6EXPL: 3

18 Oct 2001 — Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username. Desbordamiento de buffer en rpc.yppasswdd (servidor de yppasswd) en Solaris 2.6, 7 y 8 permite a atacantes remotos obtener acceso de root mediante un nombre de usuario largo. • https://www.exploit-db.com/exploits/20879 •

CVSS: 9.1EPSS: 3%CPEs: 8EXPL: 0

09 Oct 2001 — The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-40521-1 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 3

14 Aug 2001 — Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. • https://www.exploit-db.com/exploits/20772 •

CVSS: 10.0EPSS: 6%CPEs: 87EXPL: 3

14 Aug 2001 — Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •