Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sun solaris 2.4 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2003-0466
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow malicious users to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 up to and including 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buff...
Wuftpd Wu-ftpd
Redhat Wu Ftpd 2.6.1-16
Apple Mac Os X Server 10.2.6
Apple Mac Os X 10.2.6
Sun Solaris 9.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd
5 EDB exploits
9.8
CVSSv3
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote malicious users to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services suc...
Openbsd Openbsd 3.1
Sun Sunos 5.7
Sun Sunos 5.8
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Solaris 9.0
Freebsd Freebsd
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
NA
CVE-2004-0523
Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and previous versions allow remote malicious users to execute arbitrary code as root.
Mit Kerberos 1.2.2.beta1
Mit Kerberos 1.0
Sgi Propack 3.0
Sun Seam 1.0
Tinysofa Tinysofa Enterprise Server 1.0
Sun Seam 1.0.1
Mit Kerberos 1.0.8
Sun Seam 1.0.2
Sgi Propack 2.4
Tinysofa Tinysofa Enterprise Server 1.0 U1
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Mit Kerberos 5 1.2.7
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.0
NA
CVE-2003-0161
The prescan() function in the address parser (parseaddr.c) in Sendmail prior to 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" co...
Sendmail Sendmail Switch 2.1.2
Sendmail Sendmail Switch 3.0.2
Sendmail Sendmail Switch 2.2.2
Sendmail Sendmail 2.6.2
Sendmail Sendmail 8.9.2
Sendmail Sendmail Switch 2.1.1
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12
Sendmail Sendmail 2.6
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.0
Sendmail Sendmail Switch 2.1.3
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail Switch 2.2.1
Sendmail Sendmail 2.6.1
Sendmail Sendmail 8.12.8
Sendmail Sendmail 8.9.1
Sendmail Sendmail Switch 2.2
Sendmail Sendmail 8.10.2
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.9.0
2 EDB exploits
1 Github repository
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.2.2
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Openafs Openafs 1.1.1a
Gnu Glibc 2.1.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Gnu Glibc 2.2.5
Openafs Openafs 1.2.1
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Openafs Openafs 1.0
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Openafs Openafs 1.1
Gnu Glibc 2.1.1
Openafs Openafs 1.0.2
Gnu Glibc 2.3.1
NA
CVE-2002-1199
The getdbm procedure in ypxfrd allows local users to read arbitrary files, and remote malicious users to read databases outside /var/yp, via a directory traversal and symlink attack on the domain and map arguments.
Caldera Openlinux 2.4
Caldera Openlinux 2.2
Sun Sunos 5.7
Sun Sunos 5.8
Sco Openserver 5.0.5
Sun Solaris 9.0
Sco Openserver 5.0.6a
Sco Openserver 5.0.6
Caldera Openlinux 2.3
NA
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.3.2
Sgi Irix 3.3.1
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.2
Ibm Aix 4.3.2
Sco Openserver 5.0
Ibm Aix 4.3
Sun Sunos 5.3
Hp Hp-ux 11.11
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Sun Solaris 2.5
Sco Openserver 5.0.2
Sun Sunos 5.7
Sun Sunos 5.5
Sun Sunos 5.8
Sco Openserver 5.0.5
Hp Hp-ux 11.00
Hp Hp-ux 11.0.4
8 EDB exploits
2 Github repositories
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
NA
CVE-2001-0115
Buffer overflow in arp command in Solaris 7 and previous versions allows local users to execute arbitrary commands via a long -f parameter.
Sun Solaris 2.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.7
Sun Sunos 5.5
Sun Solaris 7.0
Sun Sunos 5.4
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Sunos -
1 EDB exploit
NA
CVE-2000-0471
Buffer overflow in ufsrestore in Solaris 8 and previous versions allows local users to gain root privileges via a long pathname.
Sun Sunos 5.3
Sun Sunos 4.1.4
Sun Solaris 2.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.7
Sun Solaris 1.1.4
Sun Solaris 5.4
Sun Sunos 5.5
Sun Sunos 5.8
Sun Solaris 5.5
Sun Solaris 7.0
Sun Sunos 5.4
Sun Solaris
Sun Sunos 5.5.1
Sun Solaris 1.1.3
Sun Sunos 4.1.3
Sun Sunos 5.6
Sun Solaris 5.6
Sun Solaris 5.5.1
Sun Sunos 5.0
Sun Solaris 2.6
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »