Page 9 of 96 results (0.008 seconds)

CVSS: 4.9EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerability in the System Serial Console terminal in Solaris 2.5.1, 2.6, and 7 allows local users to monitor keystrokes and possibly steal sensitive information. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F45502 http://www.iss.net/security_center/static/9492.php http://www.securityfocus.com/bid/5161 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Volume Manager daemon (vold) of Sun Solaris 2.5.1 through 8 allows local users to execute arbitrary code via unknown attack vectors. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F45707 http://www.iss.net/security_center/static/9545.php http://www.securityfocus.com/bid/5207 •

CVSS: 10.0EPSS: 1%CPEs: 59EXPL: 0

Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges. • ftp://patches.sgi.com/support/free/security/advisories/20030402-01-P http://secunia.com/advisories/7899 http://sunsolve.sun.com/search/document.do?assetkey=1-26-46944-1 http://www.kb.cert.org/vuls/id/518057 http://www.securityfocus.com/bid/6484 http://www.securitytracker.com/id?1005934 https://exchange.xforce.ibmcloud.com/vulnerabilities/10935 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module. • http://marc.info/?l=bugtraq&m=103842619803173&w=2 http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/49131 http://www.iss.net/security_center/static/10717.php http://www.kb.cert.org/vuls/id/683673 http://www.securityfocus.com/bid/6262 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3637 •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

Directory traversal vulnerabilities in multiple FTP clients on UNIX systems allow remote malicious FTP servers to create or overwrite files as the client user via filenames containing /absolute/path or .. (dot dot) sequences. • ftp://patches.sgi.com/support/free/security/advisories/20021205-01-A http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0102.html http://marc.info/?l=bugtraq&m=103962838628940&w=2 http://www.iss.net/security_center/static/10821.php http://www.kb.cert.org/vuls/id/210409 http://www.securityfocus.com/bid/6360 •