Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cde cde 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0689
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.120
Cde Cde 2.0
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.7
Sun Sunos 5.5
Sun Solaris 7.0
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Sunos -
1 EDB exploit
NA
CVE-2001-0803
Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote malicious users to execute arbitrary commands.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Open Group Cde Common Desktop Environment 2.0
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.1
2 EDB exploits
NA
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.0
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4.2.1
Sun Solaris 2.4
Digital Unix 4.0d
Digital Unix 4.0e
Sun Solaris 2.5.1
Ibm Aix 4.1.4
Ibm Aix 4.2
Digital Unix 4.0f
Ibm Aix 4.1.5
Sun Sunos 5.7
Sun Sunos 5.5
Sun Solaris 7.0
Ibm Aix 4.1.1
Sun Sunos 5.4
1 EDB exploit
1 Github repository
NA
CVE-2004-0368
Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote malicious users to execute arbitrary code via a crafted XDMCP packet.
Open Group Cde Common Desktop Environment 1.0.1
Open Group Cde Common Desktop Environment 1.2
Xi Graphics Dextop 2.1
Open Group Cde Common Desktop Environment 2.0
Xi Graphics Dextop 3.0
Open Group Cde Common Desktop Environment 2.1.20
Open Group Cde Common Desktop Environment 1.0.2
Open Group Cde Common Desktop Environment 2.1
Open Group Cde Common Desktop Environment 1.1
Ibm Aix 5.2
Ibm Aix 4.3.3
Ibm Aix 5.1
NA
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 1.1
Cde Cde 2.1
Cde Cde 1.2
Cde Cde 2.120
Cde Cde 2.0
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Ibm Aix 4.2.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Digital Unix 4.0d
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.1.4
Ibm Aix 4.2
Digital Unix 4.0f
Ibm Aix 4.1.5
Sun Sunos 5.7
Sun Sunos 5.5
NA
CVE-2002-0679
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote malicious users to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
Xi Graphics Dextop 2.1
Caldera Unixware 7.0
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Hp Hp-ux 11.11
Sun Sunos 5.7
Compaq Tru64 4.0g
Sun Sunos 5.8
Compaq Tru64 5.0a
Hp Hp-ux 11.00
Compaq Tru64 4.0f
Hp Hp-ux 10.24
Ibm Aix 4.3.3
Caldera Openunix 8.0
Sun Solaris 9.0
Compaq Tru64 5.1a
Sun Sunos 5.5.1
Hp Hp-ux 10.20
Compaq Tru64 5.1
Ibm Aix 5.1
Hp Hp-ux 10.10
Sun Solaris 2.6
NA
CVE-1999-0693
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
Ibm Aix 4
Hp Hp-ux 11
Hp Hp-ux 10
Sco Unixware 7
1 EDB exploit
NA
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.0
Sgi Irix 6.5.9
Sgi Irix 6.4
Caldera Unixware 7.1.0
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
NA
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.1 .0
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.15
Caldera Unixware 7
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started