Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 2.5 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-1999-0974
Buffer overflow in Solaris snoop allows remote malicious users to gain root privileges via GETQUOTA requests to the rpc.rquotad service.
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
890
VMScore
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Ibm Aix 4.1.1
Hp Hp-ux 9.05
Hp Hp-ux 9.09
Sun Sunos 5.4
890
VMScore
CVE-1999-0241
Guessable magic cookies in X Windows allows remote malicious users to execute commands, e.g. through xterm.
Sgi Irix
Xfree86 Project X11r6
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 7.0
Sun Sunos -
828
VMScore
CVE-1999-0320
SunOS rpc.cmsd allows malicious users to obtain root access by overwriting arbitrary files.
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 4.1.4
Sun Solaris 2.5.1
Sun Sunos 4.1.3u1
Sun Sunos 5.5.1
Sun Solaris 2.5
755
VMScore
CVE-1999-0493
rpc.statd allows remote malicious users to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd.
Sun Solaris 2.6
Sun Sunos -
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.3
Sun Sunos 5.4
1 EDB exploit
755
VMScore
CVE-1999-1432
Power management (Powermanagement) on Solaris 2.4 up to and including 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short per...
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos -
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5
Sun Solaris 2.6
Sun Solaris 2.5.1
1 EDB exploit
745
VMScore
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Sgi Irix 5.3
Sgi Irix 4.0
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 5.3
Hp Hp-ux 10.30
Nec Ews-ux V 4.2mp
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Hp Hp-ux 9.00
Nec Ews-ux V 4.2
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.4
5 EDB exploits
735
VMScore
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.1t
Sgi Irix 5.1
Sgi Irix 4.0.5 Ipr
Sgi Irix 4.0.5a
Sgi Irix 6.4
Sgi License Oeo 3.1.1
3 EDB exploits
730
VMScore
CVE-1999-1191
Buffer overflow in chkey in Solaris 2.5.1 and previous versions allows local users to gain root privileges via a long command line argument.
Sun Sunos 5.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos
Sun Solaris 2.4
Sun Sunos 5.5
2 EDB exploits
730
VMScore
CVE-1999-1158
Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd.
Sun Sunos 5.5
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 5.5.1
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »