Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 2.4 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0165
NFS cache poisoning.
Sun Nfs
Sun Sunos 5.3
Sun Sunos 4.0.1
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Sunos 4.0.3
Sun Sunos 4.1
Sun Sunos 5.4
Sun Sunos 4.0.2
Sun Sunos 4.1.1
Linux Linux Kernel 2.6.20.1
Sun Sunos 4.1.3
Sun Sunos 3.5
Sun Sunos 5.0
Bsdi Bsd Os
Sun Sunos 4.1.2
Sun Sunos 4.0
Sun Sunos 5.1
Sun Sunos 5.2
Sun Sunos -
NA
CVE-1999-0513
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
Sun Solaris 2.4
Digital Unix 4.0d
Ibm Aix 3.2.5
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Digital Unix 4.0
Freebsd Freebsd 2.2.2
Linux Linux Kernel 2.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 1.1.5.1
Sun Sunos 5.5
Linux Linux Kernel 2.0
Digital Unix 4.0b
Hp Hp-ux 11.00
Ibm Aix 3.1
Digital Unix 4.0a
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.1.0
Sun Sunos 5.4
Freebsd Freebsd 2.1.6
1 EDB exploit
NA
CVE-1999-0129
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
Eric Allman Sendmail 8.8.2
Eric Allman Sendmail 8.8.1
Eric Allman Sendmail 8.8.3
Eric Allman Sendmail 8.8
Sco Openserver 5.0
Sun Sunos 5.3
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.2
Sco Openserver 5.0.2
Sco Internet Faststart 1.0
Sun Sunos 5.5
Sco Internet Faststart 1.1
Bsdi Bsd Os 2.1
Freebsd Freebsd 2.1.6.1
Sun Sunos 5.4
Freebsd Freebsd 2.1.6
Sun Sunos 5.5.1
NA
CVE-1999-1158
Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd.
Sun Sunos 5.3
Sun Sunos 5.5
Sun Sunos 5.4
Sun Sunos 5.5.1
2 EDB exploits
9.8
CVSSv3
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote malicious users to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services suc...
Openbsd Openbsd 3.1
Sun Sunos 5.7
Sun Sunos 5.8
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Solaris 9.0
Freebsd Freebsd
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
NA
CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Hp Hp-ux 9.08
Sun Sunos 5.3
Hp Hp-ux 9.06
Hp Hp-ux 9.04
Ibm Aix 4.2.1
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Sun Solaris 2.4
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Hp Hp-ux 9.03
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Sun Sunos 5.5
Hp Hp-ux 11.00
Hp Hp-ux 10.24
Ibm Aix 4.1.1
Hp Hp-ux 9.00
NA
CVE-1999-0099
Buffer overflow in syslog utility allows local or remote malicious users to gain root privileges.
Sun Sunos 5.3
Cray Unicos 9.0
Sun Sunos 4.1.4
Sun Solaris 2.4
Convex Convexos 10.2
Bsdi Bsd Os 2.0
Convex Spp-ux 3
Convex Convexos 11.0
Cray Unicos 8.3
Sun Sunos 5.4
Cray Unicos 8.0
Sun Sunos 4.1.3u1
Convex Convexos 11.1
Sun Sunos 4.1.3
Bsdi Bsd Os 2.0.1
Ibm Aix 4.1
Ibm Aix 3.2
Convex Convexos 10.1
NA
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.3.2
Sgi Irix 3.3.1
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.2
Ibm Aix 4.3.2
Sco Openserver 5.0
Ibm Aix 4.3
Sun Sunos 5.3
Hp Hp-ux 11.11
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Sco Openserver 5.0.2
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.8
Sco Openserver 5.0.5
Hp Hp-ux 11.00
Hp Hp-ux 11.0.4
8 EDB exploits
2 Github repositories
NA
CVE-2004-0523
Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and previous versions allow remote malicious users to execute arbitrary code as root.
Mit Kerberos 1.2.2.beta1
Mit Kerberos 1.0
Sgi Propack 3.0
Sun Seam 1.0
Tinysofa Tinysofa Enterprise Server 1.0
Sun Seam 1.0.1
Mit Kerberos 1.0.8
Sun Seam 1.0.2
Sgi Propack 2.4
Tinysofa Tinysofa Enterprise Server 1.0 U1
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Mit Kerberos 5 1.2.7
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.0
NA
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Sgi Irix 6.4
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Sgi Irix 4.0.1t
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »