Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 8 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-3920
The TCP implementation in Sun Solaris 8, 9, and 10 prior to 20060726 allows remote malicious users to cause a denial of service (resource exhaustion) via a TCP packet with an incorrect sequence number, which triggers an ACK storm.
Sun Sunos 5.8
Sun Solaris 10.0
Sun Solaris 9.0
NA
CVE-2006-1780
The Bourne shell (sh) in Solaris 8, 9, and 10 allows local users to cause a denial of service (sh crash) via an unspecified attack vector that causes sh processes to crash during creation of temporary files.
Sun Sunos 5.8
Sun Solaris 10.0
Sun Solaris 9.0
NA
CVE-2008-3869
Heap-based buffer overflow in sadmind in Sun Solaris 8 and 9 allows remote malicious users to execute arbitrary code via a crafted RPC request, related to improper decoding of request parameters.
Sun Solaris 8.0
Sun Solaris 9.0
NA
CVE-2005-3099
Unspecified vulnerability in the (1) Xsun and (2) Xprt commands in Solaris 7, 8, 9, and 10 allows local users to execute arbitrary code.
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 10.0
Sun Solaris 9.0
NA
CVE-2005-0248
The Solaris Management Console (SMC) GUI for Solaris 8 and 9, when creating user accounts that are configured for password aging, creates the accounts with a blank password, which allows remote or local malicious users to break into those accounts.
Sun Sunos 5.8
Sun Solaris 9.0
Sun Solaris 8.0
NA
CVE-2008-3870
Integer overflow in sadmind in Sun Solaris 8 and 9 allows remote malicious users to execute arbitrary code via a crafted RPC request that triggers a heap-based buffer overflow, related to improper memory allocation.
Sun Solaris 8.0
Sun Solaris 9.0
NA
CVE-2006-6494
Directory traversal vulnerability in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via a .. (dot dot) sequence in the LANG environment variable that points to a locale file containing attacker-controlled format string specifiers.
Sun Sunos 5.8
Sun Solaris 10.0
Sun Solaris 9.0
NA
CVE-2005-3398
The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote malicious users to obtain sensitive information such as cookies and authentication data from HTTP headers.
Sun Sunos 5.8
Sun Solaris 10.0
Sun Solaris 9.0
NA
CVE-2006-4307
Unspecified vulnerability in the format command in Sun Solaris 8 and 9 prior to 20060821 allows local users to modify arbitrary files via unspecified vectors involving profiles that permit running format with elevated privileges, a different issue than CVE-2006-4306 and CVE-2006-...
Sun Sunos 5.8
Sun Solaris 9.0
Sun Solaris 8.0
NA
CVE-2006-0227
Multiple unspecified vulnerabilities in lpsched in Sun Solaris 8, 9, and 10 allow local users to delete arbitrary files or disable the LP print service via unknown attack vectors.
Sun Sunos 5.8
Sun Solaris 10.0
Sun Sunos 5.9
Sun Solaris 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »