Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 5.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Tritreal Ted Cde 4.3
Sgi Irix 5.3
Sgi Irix 6.4
Hp Hp-ux 10.03
Hp Hp-ux 11.00
Ibm Aix 4.1
Ibm Aix 4.1.1
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Sunos 4.1.3
Sun Sunos -
Hp Hp-ux 10.02
2 EDB exploits
10
CVSSv2
CVE-1999-0018
Buffer overflow in statd allows root privileges.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 5.2
Ibm Aix 3.2
Ibm Aix 4.1
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Solaris 2.5
Sun Sunos 5.5
Sun Solaris 2.5.1
1 EDB exploit
10
CVSSv2
CVE-1999-0165
NFS cache poisoning.
Sun Nfs
Sun Sunos 5.3
Sun Sunos 4.0.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 5.4
Sun Sunos 4.0.2
Sun Sunos 4.1.1
Bsdi Bsd Os
Sun Sunos 5.1
Sun Sunos 4.1.3
Sun Sunos 4.1.2
Sun Sunos 3.5
Sun Sunos 4.0
Linux Linux Kernel 2.6.20.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 5.2
7.8
CVSSv2
CVE-1999-0212
Solaris rpc.mountd generates error messages that allow a remote malicious user to determine what files are on the server.
Sun Sunos 5.0
Sun Sunos
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
7.5
CVSSv2
CVE-1999-0517
An SNMP community name is the default (e.g. public), null, or missing.
Hp Hp-ux 11.00
Hp Hp-ux 10
Sun Sunos 5.0
1 Article
7.2
CVSSv2
CVE-2001-0403
/opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI.
Sun Sunos 5.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-0471
Buffer overflow in ufsrestore in Solaris 8 and previous versions allows local users to gain root privileges via a long pathname.
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.6
Sun Solaris 5.5
Sun Solaris 5.6
Sun Sunos 4.1.3
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 5.5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Sun Solaris
Sun Sunos 5.0
Sun Sunos 5.5.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-1585
The (1) rcS and (2) mountall programs in Sun Solaris 2.x, possibly prior to 2.4, start a privileged shell on the system console if fsck fails while the system is booting, which allows attackers with physical access to gain root privileges.
Sun Sunos 5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »