Page 8 of 44 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

SunOS 4.1.2 and earlier allows local users to gain privileges via "LD_*" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116 http://www.cert.org/advisories/CA-1992-11.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3152 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in in.telnetd in SunOS 4.1.1 and earlier allows local users to gain root privileges. • http://www.cert.org/advisories/CA-1991-02.html https://exchange.xforce.ibmcloud.com/vulnerabilities/574 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105 http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability http://www.securityfocus.com/bid/15 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

rpc.pwdauthd in SunOS 4.1.1 and earlier does not properly prevent remote access to the daemon, which allows remote attackers to obtain sensitive system information. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/102 https://exchange.xforce.ibmcloud.com/vulnerabilities/1782 •