Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
brock tellier vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0828
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.
Sco Unixware 7.0
Sco Unixware 7.1
3 EDB exploits
NA
CVE-1999-1014
Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument.
Sun Sunos 5.7
Sun Solaris 7.0
1 EDB exploit
NA
CVE-1999-1340
Buffer overflow in faxalter in hylafax 4.0.2 allows local users to gain privileges via a long -m command line argument.
Hylafax Hylafax 4.0.2
1 EDB exploit
NA
CVE-1999-0823
Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument.
Freebsd Freebsd 3.3
1 EDB exploit
NA
CVE-1999-0825
The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.
Sco Unixware 7.0
Sco Unixware 7.0.1
Sco Unixware 7.1
1 EDB exploit
NA
CVE-1999-0826
Buffer overflow in FreeBSD angband allows local users to gain privileges.
Freebsd Freebsd 3.3
1 EDB exploit
NA
CVE-1999-0836
UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.
Sco Unixware 7.1
Sco Unixware 7.1.1
Sco Unixware 7.0
Sco Unixware 7.0.1
1 EDB exploit
NA
CVE-1999-0855
Buffer overflow in FreeBSD gdc program.
Freebsd Freebsd 3.3
1 EDB exploit
NA
CVE-1999-0857
FreeBSD gdc program allows local users to modify files via a symlink attack.
Freebsd Freebsd 3.3
1 EDB exploit
NA
CVE-1999-0864
UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file.
Sco Unixware 7.1
Sco Unixware 7.1.1
Sco Unixware 7.0
Sco Unixware 7.0.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »