Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 2.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-1432
Power management (Powermanagement) on Solaris 2.4 up to and including 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short per...
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos -
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5
Sun Solaris 2.6
Sun Solaris 2.5.1
1 EDB exploit
7.5
CVSSv2
CVE-1999-0185
In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution.
Sun Sunos 5.3
Sun Solaris 2.4
Sun Sunos 4.1.3u1
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.4
Sun Sunos 4.1.4
7.5
CVSSv2
CVE-1999-0300
nis_cachemgr for Solaris NIS+ allows malicious users to add malicious NIS+ servers.
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.3
Sun Solaris 2.4
7.5
CVSSv2
CVE-1999-0189
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111.
Sun Sunos 5.4
Sun Sunos 5.5
Sun Solaris 2.5.1
Sun Sunos 5.3
Sun Solaris 2.5
Sun Solaris 2.4
Sun Sunos 5.5.1
7.2
CVSSv2
CVE-2001-0115
Buffer overflow in arp command in Solaris 7 and previous versions allows local users to execute arbitrary commands via a long -f parameter.
Sun Solaris 2.5
Sun Solaris 2.6
Sun Sunos 5.4
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 2.4
Sun Sunos 5.5
Sun Solaris 7.0
Sun Sunos 5.5.1
Sun Solaris 2.5.1
1 EDB exploit
7.2
CVSSv2
CVE-2000-0471
Buffer overflow in ufsrestore in Solaris 8 and previous versions allows local users to gain root privileges via a long pathname.
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.6
Sun Solaris 5.5
Sun Solaris 5.6
Sun Sunos 4.1.3
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 5.5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Sun Solaris
Sun Sunos 5.0
Sun Sunos 5.5.1
1 EDB exploit
7.2
CVSSv2
CVE-2000-0055
Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option.
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 7.0
Sun Solaris 2.5
Sun Sunos 5.7
7.2
CVSSv2
CVE-1999-1585
The (1) rcS and (2) mountall programs in Sun Solaris 2.x, possibly prior to 2.4, start a privileged shell on the system console if fsck fails while the system is booting, which allows attackers with physical access to gain root privileges.
Sun Sunos 5.0
7.2
CVSSv2
CVE-1999-0691
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Ibm Aix 4.1.2
Ibm Aix 4.1.3
Ibm Aix 4.1.4
Sun Sunos 5.4
Sun Solaris 2.4
Ibm Aix 4.1
Ibm Aix 4.1.1
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.7
Sun Solaris 7.0
Digital Unix 4.0e
Digital Unix 4.0f
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Solaris 2.5.1
1 EDB exploit
1 Github repository
7.2
CVSSv2
CVE-1999-0674
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.4
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Sun Sunos 5.1
Sun Sunos 5.5
Sun Solaris 2.5
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Solaris 2.4
Netbsd Netbsd 1.2.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »