Page 72 of 559 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Unknown multiple vulnerabilities in (1) lpstat and (2) the libprint library in Solaris 2.6 through 9 may allow attackers to execute arbitrary code or read or write arbitrary files. Múltiples vulnerabilidades desconocidas en lpstat y la librería libprint en Solaris 2.6 a 9 puede permitir a atacantes ejecutar código arbitrario o leer o escribir ficheros arbitrarios. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57451 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4098 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The ed editor for Sun Solaris 2.6, 7, and 8 allows local users to create or overwrite arbitrary files via a symlink attack on temporary files. • http://secunia.com/advisories/10411 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57443-1 http://www.auscert.org.au/render.html?it=3688 http://www.osvdb.org/2955 http://www.securityfocus.com/bid/9199 https://exchange.xforce.ibmcloud.com/vulnerabilities/13952 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in CDE Print Viewer (dtprintinfo) for Sun Solaris 2.6 through 9 may allow local users to execute arbitrary code. • http://secunia.com/advisories/10384 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57441-1 http://www.auscert.org.au/render.html?it=3675 http://www.ciac.org/ciac/bulletins/o-035.shtml http://www.osvdb.org/2924 http://www.securityfocus.com/bid/9170 https://exchange.xforce.ibmcloud.com/vulnerabilities/13914 •

CVSS: 3.7EPSS: 0%CPEs: 8EXPL: 0

The Xsun server for Sun Solaris 2.6 through 9, when running in Direct Graphics Access (DGA) mode, allows local users to cause a denial of service (Xsun crash) or to create or overwrite arbitrary files on the system, probably via a symlink attack on temporary server files. • http://secunia.com/advisories/10346 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57419-1 http://www.ciac.org/ciac/bulletins/o-033.shtml http://www.osvdb.org/2892 http://www.securityfocus.com/bid/9147 https://exchange.xforce.ibmcloud.com/vulnerabilities/13890 •

CVSS: 4.3EPSS: 2%CPEs: 58EXPL: 0

ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value. ISC BIND 8.3.x antes de 8.3.7, y 8.4.x antes de 8.4.3 permite a atacantes remotos envenenar la cache mediante un servidor de nombres malicioso que devuelve respuestas negativas con un valor TTL (time to live) largo. • ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.33/CSSA-2003-SCO.33.txt http://secunia.com/advisories/10542 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57434 http://www.debian.org/security/2004/dsa-409 http://www.kb.cert.org/vuls/id/734644 http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt https://oval.cisecurity.org/repository& •