Page 78 of 564 results (0.008 seconds)

CVSS: 10.0EPSS: 19%CPEs: 6EXPL: 3

Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username. Desbordamiento de buffer en rpc.yppasswdd (servidor de yppasswd) en Solaris 2.6, 7 y 8 permite a atacantes remotos obtener acceso de root mediante un nombre de usuario largo. • https://www.exploit-db.com/exploits/20879 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/209 http://www.ciac.org/ciac/bulletins/m-008.shtml http://www.kb.cert.org/vuls/id/327281 http://www.securityfocus.com/archive/1/187086 http://www.securityfocus.com/archive/1/200110041632.JAA28125%40dim.ucsd.edu http://www.securityfocus.com/bid/2763 https://exchange.xforce.ibmcloud.com/vulnerabilities/6629 https://oval.cisecurity.org/repository/search/definition/oval%3 •

CVSS: 7.5EPSS: 3%CPEs: 8EXPL: 0

The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-40521-1 http://www.securityfocus.com/bid/7396 https://exchange.xforce.ibmcloud.com/vulnerabilities/11841 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in cb_reset in the System Service Processor (SSP) package of SunOS 5.8 allows a local user to execute arbitrary code via a long argument. • http://www.securityfocus.com/archive/1/192299 http://www.securityfocus.com/bid/2893 https://exchange.xforce.ibmcloud.com/vulnerabilities/6726 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in dtmail in Solaris 2.6 and 7 allows local users to gain privileges via the MAIL environment variable. • https://www.exploit-db.com/exploits/21024 http://marc.info/?l=bugtraq&m=99598918914068&w=2 http://www.securityfocus.com/bid/3081 https://exchange.xforce.ibmcloud.com/vulnerabilities/6879 •

CVSS: 10.0EPSS: 0%CPEs: 87EXPL: 3

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt http://archives.neohapsis.com/archives/hp/2001-q4/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •