Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 5.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0018
Buffer overflow in statd allows root privileges.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 5.2
Ibm Aix 3.2
Ibm Aix 4.1
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Solaris 2.5
Sun Sunos 5.5
Sun Solaris 2.5.1
1 EDB exploit
10
CVSSv2
CVE-1999-0165
NFS cache poisoning.
Sun Nfs
Sun Sunos 5.3
Sun Sunos 4.0.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 5.4
Sun Sunos 4.0.2
Sun Sunos 4.1.1
Bsdi Bsd Os
Sun Sunos 5.1
Sun Sunos 4.1.3
Sun Sunos 4.1.2
Sun Sunos 3.5
Sun Sunos 4.0
Linux Linux Kernel 2.6.20.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 5.2
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
7.5
CVSSv2
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
7.2
CVSSv2
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
7.2
CVSSv2
CVE-2000-0471
Buffer overflow in ufsrestore in Solaris 8 and previous versions allows local users to gain root privileges via a long pathname.
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.6
Sun Solaris 5.5
Sun Solaris 5.6
Sun Sunos 4.1.3
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 5.5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Sun Solaris
Sun Sunos 5.0
Sun Sunos 5.5.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0674
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Sun Sunos 5.1
Sun Sunos 5.5
Sun Solaris 2.5
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.4
Netbsd Netbsd 1.2.1
1 EDB exploit
7.2
CVSSv2
CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local malicious users to conduct brute force password guessing.
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 5.2
Redhat Linux 6.0
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 6.1
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Redhat Linux 5.0
Redhat Linux 5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Redhat Linux 2.0
Redhat Linux 2.1
Sun Solaris
1 EDB exploit
7.2
CVSSv2
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.3
Sgi Irix 6.0
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »