Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 4.0 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-1999-1122
Vulnerability in restore in SunOS 4.0.3 and previous versions allows local users to gain privileges.
Sun Sunos
Sun Sunos 4.0
Sun Sunos 4.0.1
10
CVSSv2
CVE-1999-1467
Vulnerability in rcp on SunOS 4.0.x allows remote attackers from trusted hosts to execute arbitrary commands as root, possibly related to the configuration of the nobody user.
Sun Sunos 4.0.3c
Sun Sunos 4.0.2
Sun Sunos 4.0.3
Sun Sunos 4.0
Sun Sunos 4.0.1
7.5
CVSSv2
CVE-1999-1506
Vulnerability in SMI Sendmail 4.0 and previous versions, on SunOS up to 4.0.3, allows remote malicious users to access user bin.
Sun Sunos 4.0.3
Sun Sunos 4.0.3c
Sun Sunos 4.0
Sun Sunos 4.0.2
Sun Sunos 3.5
Sun Sunos 4.0.1
5
CVSSv2
CVE-1999-0209
The SunView (SunTools) selection_svc facility allows remote users to read files.
Sun Sunos 4.0
Sun Sunos 4.0.1
Sun Sunos 4.0.2
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 4.1.1
Sun Sunos 3.5
3 EDB exploits
10
CVSSv2
CVE-1999-0165
NFS cache poisoning.
Sun Nfs
Sun Sunos 5.3
Sun Sunos 4.0.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 5.4
Sun Sunos 4.0.2
Sun Sunos 4.1.1
Bsdi Bsd Os
Sun Sunos 5.1
Sun Sunos 4.1.3
Sun Sunos 4.1.2
Sun Sunos 3.5
Sun Sunos 4.0
Linux Linux Kernel 2.6.20.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 5.2
7.2
CVSSv2
CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local malicious users to conduct brute force password guessing.
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 5.2
Redhat Linux 6.0
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 6.1
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Redhat Linux 5.0
Redhat Linux 5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Redhat Linux 2.0
Redhat Linux 2.1
Sun Solaris
1 EDB exploit
10
CVSSv2
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote malicious users to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services suc...
Openbsd Openbsd 3.1
Sun Sunos 5.7
Sun Sunos 5.8
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Solaris 9.0
Freebsd Freebsd
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
2.1
CVSSv2
CVE-1999-1402
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems prior to 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Sun Solaris 2.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Sun Solaris 2.5
Sun Solaris 2.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 4.0
1 EDB exploit
6.2
CVSSv2
CVE-1999-1468
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
Next Next 2.0
Sgi Irix 3.3.3
Next Next 2.1
Sgi Irix 3.3
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 4.0
Cray Unicos 6.0e
Sun Sunos 4.1.1
Cray Unicos 6.1
Sun Sunos 4.0.3
Sun Sunos 4.0.3c
Sun Sunos 4.1
Cray Unicos 6.0
Sun Sunos 4.1psr A
4.6
CVSSv2
CVE-1999-0143
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.
Process Software Multinet 3.4
Mit Kerberos 4.0
Process Software Multinet 3.5
Mit Kerberos 5 -
Sun Sunos 5.3
Sun Sunos 5.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »