Filter
AND
AND

Sun SunOSUnknown vulnerability in (1) loadmodule, and (2) modload if modload is installed with setuid/setgid …

First published (updated )

HP HP-UXThe AIX FTP client can be forced to execute commands from a malicious server through shell metachara…

First published (updated )

Sun SunOSThe portmapper may act as a proxy and redirect service requests from an attacker, making the request…

7.5
First published (updated )

Sun SunOSloadmodule in SunOS 4.1.x, as used by xnews, does not properly sanitize its environment, which allow…

7.2
First published (updated )

Sun SunOSSunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows loca…

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Sun SunOSSun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on f…

7.2
First published (updated )

Sun SunOS/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directo…

7.2
First published (updated )

Sun SunOSExtra long export lists over 256 characters in some mount daemons allows NFS directories to be mount…

First published (updated )

Sun SunOSExpreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root acce…

2.1
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203