Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openunix vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1478
Buffer overflow in xlock in UnixWare 7.1.0 and 7.1.1 and Open Unix 8.0.0 allows local users to execute arbitrary code.
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Caldera Openunix 8.0
NA
CVE-2001-0858
Buffer overflow in pppattach and other linked PPP utilities in Caldera Open Unix 8.0 and UnixWare 7.1.0 and 7.1.1 allows local users to gain privileges.
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Caldera Openunix 8.0
NA
CVE-2002-0884
Multiple format string vulnerabilities in in.rarpd (ARP server) on Solaris, Caldera UnixWare and Open UNIX, and possibly other operating systems, allows remote malicious users to execute arbitrary code via format strings that are not properly handled in the functions (1) syserr a...
Caldera Unixware 7.1.1
Caldera Openunix 8.0
Sun Sunos 5.8
Sun Sunos 5.7
NA
CVE-2002-0885
Multiple buffer overflows in in.rarpd (ARP server) on Solaris, and possibly other operating systems including Caldera UnixWare and Open UNIX, allow remote malicious users to execute arbitrary code, possibly via the functions (1) syserr and (2) error.
Caldera Unixware 7.1.1
Caldera Openunix 8.0
Sun Sunos 5.7
Sun Sunos 5.8
NA
CVE-1999-0696
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
Sun Solaris 2.6
Sun Sunos 4.1.3
Sun Sunos 5.5
Sun Solaris 2.5
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 5.5.1
2 EDB exploits
NA
CVE-2002-0679
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote malicious users to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
Caldera Unixware 7.1.1
Xi Graphics Dextop 2.1
Caldera Unixware 7.0
Caldera Unixware 7.1.0
Caldera Openunix 8.0
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.7
Sun Sunos 5.8
Sun Solaris 9.0
Compaq Tru64 5.1a
Hp Hp-ux 10.10
Sun Sunos 5.5.1
Sun Solaris 2.6
Compaq Tru64 5.0a
Compaq Tru64 5.1
Ibm Aix 4.3.3
Ibm Aix 5.1
Compaq Tru64 4.0f
Compaq Tru64 4.0g
Hp Hp-ux 11.00
Hp Hp-ux 11.11
NA
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
NA
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
NA
CVE-2001-1579
The timed program (in.timed) in UnixWare 7 and OpenUnix 8.0.0 does not properly terminate certain strings with a null, which allows remote malicious users to cause a denial of service.
Sco Open Unix 8.0.0
Sco Unixware 7
NA
CVE-2001-0627
vi as included with SCO OpenServer 5.0 - 5.0.6 allows a local malicious user to overwrite arbitrary files via a symlink attack.
Sco Openserver 5.0
Sco Openserver 5.0.1
Sco Openserver 5.0.2
Sco Openserver 5.0.3
Sco Openserver 5.0.4
Sco Openserver 5.0.5
Sco Openserver 5.0.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2