Page 9 of 145 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 91EXPL: 0

The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal dtterm permite a atacantes modificar el título de la ventana mediante una cierta secuencia de carácter de escape, y a continuación insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.securityfocus.com/advisories/6236 http://www.securityfocus.com/bid/6942 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

The FTP client for Solaris 2.6, 7, and 8 with the debug (-d) flag enabled displays the user password on the screen during login. • http://secunia.com/advisories/8186 http://sunsolve.sun.com/search/document.do?assetkey=1-26-51081-1 http://www.securityfocus.com/bid/6989 http://www.securitytracker.com/id?1006195 https://exchange.xforce.ibmcloud.com/vulnerabilities/11436 •

CVSS: 5.0EPSS: 10%CPEs: 9EXPL: 0

Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1 http://www.securityfocus.com/bid/6883 http://www.securitytracker.com/id?1006131 https://exchange.xforce.ibmcloud.com/vulnerabilities/11368 •

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in mail for Solaris 2.6 through 9 allows local users to read the email of other users. • http://secunia.com/advisories/8058 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50751-1 http://www.securityfocus.com/bid/6838 http://www.securitytracker.com/id?1006084 https://exchange.xforce.ibmcloud.com/vulnerabilities/11303 •

CVSS: 5.0EPSS: 56%CPEs: 10EXPL: 0

Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure. Vulnerabilidad de atravesamiento de directorios en el demonio servidor de Sun Kodak Color Management System (KMCS) (kcms_server) permite a atacantes remotos leer ficheros arbitrarios mediante el procedimiento KCS_OPEN_PROFILE • http://marc.info/?l=bugtraq&m=104326556329850&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50104 http://www.entercept.com/news/uspr/01-22-03.asp http://www.kb.cert.org/vuls/id/850785 http://www.securityfocus.com/bid/6665 https://exchange.xforce.ibmcloud.com/vulnerabilities/11129 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A120 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A195 https: •