Page 90 of 559 results (0.012 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 3

Buffer overflow in Xsun in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20743 http://archives.neohapsis.com/archives/bugtraq/2001-04/0158.html http://www.securityfocus.com/bid/2561 https://exchange.xforce.ibmcloud.com/vulnerabilities/6343 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A555 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

Buffer overflow in ipcs in Solaris 7 x86 allows local users to execute arbitrary code via a long TZ (timezone) environmental variable, a different vulnerability than CAN-2002-0093. • https://www.exploit-db.com/exploits/20751 http://archives.neohapsis.com/archives/bugtraq/2001-04/0217.html http://www.securityfocus.com/bid/2581 https://exchange.xforce.ibmcloud.com/vulnerabilities/6369 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable. • https://www.exploit-db.com/exploits/20766 http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html •

CVSS: 6.4EPSS: 3%CPEs: 2EXPL: 2

FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •