Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 2.5.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-1228
Unknown vulnerability in NFS on Solaris 2.5.1 through Solaris 9 allows an NFS client to cause a denial of service by killing the lockd daemon.
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Sunos 5.8
Sun Solaris 8.0
Sun Sunos 5.5
Sun Solaris 9.0
7.2
CVSSv2
CVE-2002-0572
FreeBSD 4.5 and previous versions, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called set...
Freebsd Freebsd 4.5
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Sun Sunos -
Sun Solaris 7.0
Openbsd Openbsd 2.3
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.6
Freebsd Freebsd 4.4
Sun Solaris 8.0
Openbsd Openbsd 2.1
Sun Sunos 5.7
Sun Sunos 5.8
1 EDB exploit
7.5
CVSSv2
CVE-2002-0573
Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote malicious users to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed.
Sun Sunos 5.8
Sun Solaris 8.0
Sun Sunos 5.7
Sun Solaris 7.0
Sun Solaris 2.6
Sun Sunos -
10
CVSSv2
CVE-2002-0033
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote malicious users to execute arbitrary code via a request with a long directory and cache name.
Sun Solaris 8.0
Sun Solaris 7.0
Sun Solaris 2.5.1
Sun Solaris 2.6
Sun Sunos -
1 EDB exploit
7.2
CVSSv2
CVE-2002-0084
Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.
Sun Solaris 8.0
Sun Solaris 2.6
Sun Sunos 5.7
5
CVSSv2
CVE-2002-0085
cachefsd in Solaris 2.6, 7, and 8 allows remote malicious users to cause a denial of service (crash) via an invalid procedure call in an RPC request.
Sun Solaris 2.6
Sun Sunos 5.7
Sun Solaris 8.0
2.1
CVSSv2
CVE-2001-1503
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 up to and including 5.8 allows remote malicious users to list all accounts on a host by typing finger 'a b c d e f g h'@host.
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.5.1
Sun Sunos 5.8
Sun Sunos 5.5
Sun Solaris 8.0
Sun Sunos 5.7
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.6
Sun Solaris 7.0
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
7.5
CVSSv2
CVE-2001-1414
The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote malicious users to hide their activities, possibly when certain BSM audit files are not present under the FTP root.
Sun Solaris 2.5.1
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.5.1
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
4.6
CVSSv2
CVE-2001-0565
Buffer overflow in mailx in Solaris 8 and previous versions allows a local malicious user to gain additional privileges via a long '-F' command line option.
Sun Sunos 5.5
Sun Sunos -
Sun Sunos 5.7
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 7.0
Sun Solaris 2.5
Sun Solaris 8.0
Sun Solaris 2.6
Sun Sunos
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »