Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 5.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-0696
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
Sun Solaris 2.6
Sun Sunos 4.1.3
Sun Sunos 5.5
Sun Solaris 2.5
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 5.5.1
2 EDB exploits
3.6
CVSSv2
CVE-2005-4796
Unspecified vulnerability in the XView library (libxview.so) in Solaris 2.5 to 10 allows local users to corrupt files via unknown vectors related to the handling of the clipboard selection while an XView application exits.
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 2.6
Sun Sunos -
Sun Solaris 10.0
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 9.0
Sun Sunos 5.5
Sun Solaris 7.0
Sun Solaris 8.0
4.6
CVSSv2
CVE-1999-0303
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
Sun Sunos 5.3
Sun Sunos 4.1.4
Sun Solaris 2.4
Netbsd Netbsd 1.3
Sun Solaris 2.5
Digital Osf 1 1.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.1
Sun Solaris 1.1.4
Sun Sunos 5.5
Openbsd Openbsd 2.2
Sun Sunos 5.4
Sun Solaris
Sun Sunos 5.5.1
Sun Solaris 1.1.3
Sun Sunos 4.1.3
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 5.1
Sun Sunos 5.2
7.2
CVSSv2
CVE-1999-0055
Buffer overflows in Sun libnsl allow root access.
Ibm Aix 4.2.1
Ibm Aix 4.3
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Sunos 5.3
Sun Solaris 2.4
Sun Solaris 2.5
Sun Sunos -
Ibm Aix 4.2
Sun Sunos 5.2
Sun Sunos 5.4
Sun Solaris 2.6
4.6
CVSSv2
CVE-1999-0125
Buffer overflow in SGI IRIX mailx program.
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.3
Redhat Linux 4.2
Sun Sunos 5.5
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Solaris 2.6
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Sunos -
2 EDB exploits
2.1
CVSSv2
CVE-1999-1402
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems prior to 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket.
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Sun Solaris 2.5.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.0
Sun Solaris 2.5
Sun Solaris 2.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 3.1
Sun Sunos 5.0
Sun Sunos -
Sun Sunos 4.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-0118
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local malicious users to conduct brute force password guessing.
Redhat Linux 3.0.3
Redhat Linux 4.0
Redhat Linux 5.2
Redhat Linux 6.0
Sun Sunos -
Sun Sunos 4.1.4
Sun Sunos 5.1
Sun Sunos 5.2
Redhat Linux 4.1
Redhat Linux 4.2
Redhat Linux 6.1
Sun Solaris 1.1.3
Sun Sunos 5.3
Sun Sunos 5.4
Redhat Linux 5.0
Redhat Linux 5.1
Sun Solaris 1.1.4
Sun Solaris 2.4
Sun Sunos 5.5
Redhat Linux 2.0
Redhat Linux 2.1
Sun Solaris
1 EDB exploit
7.2
CVSSv2
CVE-1999-0689
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
Cde Cde 2.120
Cde Cde 2.0
Cde Cde 2.1
Cde Cde 1.1
Cde Cde 1.2
Cde Cde 1.0.1
Cde Cde 1.0.2
Sun Solaris 7.0
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 2.5
Sun Solaris 2.6
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.5.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0033
Command execution in Sun systems via buffer overflow in the at program.
Ncr Mp-ras 3.0
Sgi Irix
Sco Openserver 5.0
Sun Sunos 5.5
Sco Open Desktop 3.0
Sun Sunos 5.3
Ibm Aix
Sco Openserver 3.0
Sco Unixware 3.2v4
Sun Sunos 5.4
Sco Unixware 2.1
Sun Sunos 5.5.1
10
CVSSv2
CVE-1999-0018
Buffer overflow in statd allows root privileges.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 5.2
Ibm Aix 3.2
Ibm Aix 4.1
Sun Sunos 5.4
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Solaris 2.5
Sun Sunos 5.5
Sun Solaris 2.5.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »