Page 79 of 564 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 15EXPL: 3

Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. • https://www.exploit-db.com/exploits/20772 https://www.exploit-db.com/exploits/20773 http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html http://online.securityfocus.com/archive/1/184210 http://www.kb.cert.org/vuls/id/446864 http://www.securityfocus.com/bid/2610 https://exchange.xforce.ibmcloud.com/vulnerabilities/8246 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 4

kcms_configure as included with Solaris 7 and 8 allows a local attacker to gain additional privileges via a buffer overflow in a command line argument. • https://www.exploit-db.com/exploits/20740 https://www.exploit-db.com/exploits/20741 http://archives.neohapsis.com/archives/bugtraq/2001-04/0140.html http://www.securityfocus.com/bid/2558 https://exchange.xforce.ibmcloud.com/vulnerabilities/6359 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A65 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 3

Buffer overflow in the kcsSUNWIOsolf.so library in Solaris 7 and 8 allows local attackers to execute arbitrary commands via the KCMS_PROFILES environment variable, e.g. as demonstrated using the kcms_configure program. • https://www.exploit-db.com/exploits/20767 https://www.exploit-db.com/exploits/20768 http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html http://www.securityfocus.com/bid/2605 https://exchange.xforce.ibmcloud.com/vulnerabilities/6365 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in the line printer daemon (in.lpd) for Solaris 8 and earlier allows local and remote attackers to gain root privileges via a "transfer job" routine. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/206 http://www.cert.org/advisories/CA-2001-15.html http://www.securityfocus.com/bid/2894 http://xforce.iss.net/alerts/advise80.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6718 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •