Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun sunos 5.7 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2002-0088
Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path.
Sun Solaris 2.6
Sun Sunos 5.7
Sun Solaris 8.0
7.2
CVSSv2
CVE-2002-0089
Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file.
Sun Solaris 2.6
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 8.0
2.1
CVSSv2
CVE-2001-1503
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 up to and including 5.8 allows remote malicious users to list all accounts on a host by typing finger 'a b c d e f g h'@host.
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.5.1
Sun Sunos 5.8
Sun Sunos 5.5
Sun Solaris 8.0
Sun Sunos 5.7
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.6
Sun Solaris 7.0
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0779
Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote malicious users to gain root access via a long username.
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 7.0
Sun Solaris 2.6
Sun Solaris 8.0
Sun Sunos -
1 EDB exploit
7.5
CVSSv2
CVE-2001-1414
The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote malicious users to hide their activities, possibly when certain BSM audit files are not present under the FTP root.
Sun Solaris 2.5.1
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.5.1
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
4.6
CVSSv2
CVE-2001-0548
Buffer overflow in dtmail in Solaris 2.6 and 7 allows local users to gain privileges via the MAIL environment variable.
Sun Solaris 2.6
Sun Sunos 5.7
1 EDB exploit
4.6
CVSSv2
CVE-2001-0565
Buffer overflow in mailx in Solaris 8 and previous versions allows a local malicious user to gain additional privileges via a long '-F' command line option.
Sun Sunos 5.5
Sun Sunos -
Sun Sunos 5.7
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 7.0
Sun Solaris 2.5
Sun Solaris 8.0
Sun Solaris 2.6
Sun Sunos
2 EDB exploits
4.6
CVSSv2
CVE-2001-0594
kcms_configure as included with Solaris 7 and 8 allows a local malicious user to gain additional privileges via a buffer overflow in a command line argument.
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
Sun Sunos 5.7
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »