Page 9 of 174 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

/opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI. • https://www.exploit-db.com/exploits/20715 http://archives.neohapsis.com/archives/bugtraq/2001-03/0326.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6267 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •

CVSS: 6.4EPSS: 3%CPEs: 2EXPL: 2

FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0). • http://marc.info/?l=bugtraq&m=97983943716311&w=2 http://marc.info/?l=bugtraq&m=98028642319440&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6224 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter. • https://www.exploit-db.com/exploits/250 http://marc.info/?l=bugtraq&m=97934312727101&w=2 http://marc.info/?l=bugtraq&m=97957435729702&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/200&type=0&nav=sec.sba http://www.securityfocus.com/bid/2193 https://exchange.xforce.ibmcloud.com/vulnerabilities/5928 •