Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 4.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0214
Denial of service by sending forged ICMP unreachable packets.
Sun Sunos 4.1
Sun Sunos 4.1.1
Sun Sunos 4.1.2
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-1999-0687
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote malicious user to execute commands.
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.0.1
Cde Cde 1.0.2
Cde Cde 2.120
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.3
Sun Sunos 5.4
Digital Unix 4.0f
Ibm Aix 4.2
Ibm Aix 4.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
7.5
CVSSv2
CVE-1999-0017
FTP servers can allow an malicious user to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
Gnu Inet 5.01
Gnu Inet 6.01
Washington University Wu-ftpd 2.4
Gnu Inet 6.02
Sun Sunos 5.5
Ibm Aix 4.3
Sco Open Desktop 3.0
Sun Sunos 5.3
Caldera Openlinux 1.2
Sun Sunos 4.1.4
Ibm Aix 4.2
Netbsd Netbsd 1.2.1
Freebsd Freebsd 2.1.7
Siemens Reliant Unix
Netbsd Netbsd 1.0
Sun Sunos 5.4
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.0
Sun Sunos 4.1.3u1
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
7.2
CVSSv2
CVE-1999-1586
loadmodule in SunOS 4.1.x, as used by xnews, does not properly sanitize its environment, which allows local users to gain privileges, a different vulnerability than CVE-1999-1584.
Sun Sunos 4.1.3
Sun Sunos 4.1.3c
Sun Sunos 4.1.1
Sun Sunos 4.1.2
7.2
CVSSv2
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Sun Sunos 5.4
Sun Solaris 2.4
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.7
Sun Solaris 7.0
Digital Unix 4.0e
Digital Unix 4.0f
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Solaris 2.5.1
1 EDB exploit
1 Github repository
7.2
CVSSv2
CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local malicious users to conduct brute force password guessing.
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 5.2
Redhat Linux 6.0
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 6.1
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Redhat Linux 5.0
Redhat Linux 5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Redhat Linux 2.0
Redhat Linux 2.1
Sun Solaris
1 EDB exploit
7.2
CVSSv2
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Sgi Irix 5.3
Sgi Irix 4.0
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 5.3
Hp Hp-ux 10.30
Nec Ews-ux V 4.2mp
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Hp Hp-ux 9.00
Nec Ews-ux V 4.2
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.4
5 EDB exploits
7.2
CVSSv2
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.3
Sgi Irix 6.0
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
7.2
CVSSv2
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.1t
Sgi Irix 5.1
Sgi Irix 4.0.5 Ipr
Sgi Irix 4.0.5a
Sgi Irix 6.4
Sgi License Oeo 3.1.1
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »