129 results (0.012 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The STARTTLS implementation in SCO SCOoffice Server does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La aplicación STARTTLS en SCO SCOoffice Server no restringe el búfer I/O de forma adecuada, lo que permite a los atacantes "man-in-the-middle insertar comandos en las sesiones SMTP cifrado mediante el envío de un comando de texto plano que se procesa después de que TLS está en su lugar, relacionado con un ataque "inyección de de comando en texto claro", un problema similar a CVE -2011- 0411. • http://www.kb.cert.org/vuls/id/555316 http://www.kb.cert.org/vuls/id/MAPG-8D9M6A http://www.securityfocus.com/bid/46767 http://www.vupen.com/english/advisories/2011/0613 https://exchange.xforce.ibmcloud.com/vulnerabilities/65932 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the IGMP driver in SCO Unixware Release 7.1.4 Maintenance Pack 4 allows attackers to cause a denial of service (system panic) via unspecified vectors. Vulnerabilidad sin especificar en el controlador IGMP en SCO Unixware Release v7.1.4 Maintenance Pack 4, permite a atacantes remotos provocar una denegación de servicio (error irrecuperable del sistema) a través de vectores no especificados. • ftp://ftp.sco.com/pub/unixware7/714/security/p535283/p535283.txt http://osvdb.org/54168 http://secunia.com/advisories/34951 http://www.securityfocus.com/bid/34781 https://exchange.xforce.ibmcloud.com/vulnerabilities/50255 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

Untrusted search path vulnerability in (1) hvdisp and (2) rcvm in ReliantHA 1.1.4 in SCO UnixWare 7.1.4 allows local users to gain root privileges by modifying the RELIANT_PATH environment variable to point to a malicious bin/hvenv program. Vulnerabilidad de ruta de búsqueda no confiable en hvdisp y rcvm en ReliantHA v.1.1.4 en SCO UnixWare 7.1.4 que permite a usuarios locales obtener permisos de root modificando la variable de entorno RELIANT_PATH para que apunte a un programa bin/henv malicioso. • https://www.exploit-db.com/exploits/5356 ftp://ftp.sco.com/pub/unixware7/714/security/p534850/p534850.txt http://osvdb.org/46706 http://osvdb.org/46707 http://secunia.com/advisories/30921 http://www.securityfocus.com/bid/28624 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

Merge mcd in ReliantHA 1.1.4 in SCO UnixWare 7.1.4 allows local users to gain root privileges via a crafted -d argument that contains .. (dot dot) sequences that point to a directory containing a file whose name includes shell metacharacters. Vulnerabilidad en el comando Merge mcd en ReliantHA v1.1.4 en SCO UnixWare 7.1.4. Permite a usuarios locales obtener permisos de root a través de un argumento -d manipulado que contiene secuencias de .. (dos puntos) que apuntan a un directorio que contiene un fichero cuyo nombre contiene metacaracteres de shell. • https://www.exploit-db.com/exploits/5357 ftp://ftp.sco.com/pub/unixware7/714/security/p534850/p534850.txt http://secunia.com/advisories/30921 http://www.osvdb.org/51234 http://www.securityfocus.com/bid/28625 • CWE-20: Improper Input Validation •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in pkgadd in SCO UnixWare 7.1.4 before p534589 allows local users to create or append to arbitrary files via ".." sequences in an unspecified environment variable, probably PKGINST. Vulnerabilidad de Salto de Directorio en pkgadd de SCO UnixWare 7.1.4 y versiones anteriores a p534589 permite a usuarios locales crear o agregar archivos de su elección mediante secuencias “..” en una variable de entorno sin especificar, probablemente PKGINST. • https://www.exploit-db.com/exploits/5355 http://ftp.sco.com/pub/unixware7/714/security/p534589/p534589.txt http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=676 http://secunia.com/advisories/29657 http://www.sco.com/support/update/download/release.php?rid=324 http://www.securitytracker.com/id?1019787 https://exchange.xforce.ibmcloud.com/vulnerabilities/41759 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •