6.4AI Score
0.013EPSS
6.8AI Score
0.003EPSS
The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify...
8AI Score
0.019EPSS
7.2AI Score
0.0004EPSS
7.7AI Score
0.0004EPSS
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of...
7.3AI Score
0.143EPSS
7.7AI Score
0.003EPSS
Automount daemon automountd allows local or remote users to gain privileges via shell...
7.1AI Score
0.013EPSS
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe...
7.2AI Score
0.06EPSS
In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command...
7.7AI Score
0.006EPSS
7.4AI Score
0.035EPSS
Solaris sysdef command allows local users to read kernel memory, potentially leading to root...
7AI Score
0.0004EPSS
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or...
6.9AI Score
0.004EPSS
6.7AI Score
0.007EPSS
7.1AI Score
0.0004EPSS
6.5AI Score
0.881EPSS
Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root...
7.7AI Score
0.0004EPSS
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping...
7AI Score
0.0004EPSS
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is...
6.7AI Score
0.035EPSS
Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line...
7.7AI Score
0.0005EPSS
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that...
7.3AI Score
0.0004EPSS
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root...
7.9AI Score
0.001EPSS
7.9AI Score
0.0004EPSS
7AI Score
0.0004EPSS
Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental...
7.6AI Score
0.0004EPSS
7.4AI Score
0.029EPSS
7.7AI Score
0.0004EPSS
7.1AI Score
0.009EPSS
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root...
8.2AI Score
0.0004EPSS
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in...
7.4AI Score
0.0004EPSS
aspppd on Solaris 2.5 x86 allows local users to modify arbitrary files and gain root privileges via a symlink attack on the /tmp/.asppp.fifo...
7.4AI Score
0.0004EPSS
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include:...
6.6AI Score
0.0004EPSS
Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root...
7.4AI Score
0.001EPSS
Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through...
7AI Score
0.0004EPSS
admintool in Solaris allows a local user to write to arbitrary files and gain root...
7.5AI Score
0.0004EPSS
7.4AI Score
0.0004EPSS
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through...
7.9AI Score
0.006EPSS
7.9AI Score
0.007EPSS
In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root...
6.9AI Score
0.004EPSS
The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a...
7AI Score
0.0004EPSS