| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Buffer overflow in Solaris kcms_configure command allows local users to gain root access. |
| The open() function in FreeBSD allows local attackers to write to arbitrary files. |
| FreeBSD mmap function allows users to modify append-only or immutable files. |
| ppl program in HP-UX allows local users to create root files through symlinks. |
| vhe_u_mnt program in HP-UX allows local users to create root files through symlinks. |
| Vulnerability in HP-UX mediainit program. |
| SGI syserr program allows local users to corrupt files. |
| SGI permissions program allows local users to gain root privileges. |
| SGI mediad program allows local users to gain root access. |
| In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access. |
| Buffer overflow in mstm in HP-UX allows local users to gain root access. |
| AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled. |
| AIX Licensed Program Product performance tools allow local users to gain root access. |
| Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. |
| Buffer overflow in Internet Explorer 4.0(1). |
| HP OpenView Omniback allows remote execution of commands as root via spoofing, and local users can gain root access via a symlink attack. |
| Buffer overflow in the Linux mail program "deliver" allows local users to gain root access. |
| Linux PAM modules allow local users to gain root access using temporary files. |
| Transarc DCE Distributed File System (DFS) 1.1 for Solaris 2.4 and 2.5 does not properly initialize the grouplist for users who belong to a large number of groups, which could allow those users to gain access to resources that are protected by DFS. |
| Buffer overflow in Kerberos IV compatibility libraries as used in Kerberos V allows local users to gain root privileges via a long line in a kerberos configuration file, which can be specified via the KRB_CONF environmental variable. |