Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sco unixware 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0988
UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
Sco Unixware 2.0.3
Sco Unixware 7.1
Sco Unixware 7.1.16
Sco Unixware 2.1
Sco Unixware 7.1.1
Sco Unixware 7.0
Sco Unixware 2.0
Sco Unixware 7.0.1
1 EDB exploit
NA
CVE-1999-0845
Buffer overflow in SCO su program allows local users to gain root access via a long username.
Sco Unixware 7.0
1 EDB exploit
NA
CVE-1999-0033
Command execution in Sun systems via buffer overflow in the at program.
Ncr Mp-ras 3.0
Sgi Irix
Sco Openserver 5.0
Sun Sunos 5.5
Sco Open Desktop 3.0
Sun Sunos 5.3
Ibm Aix
Sco Openserver 3.0
Sco Unixware 3.2v4
Sun Sunos 5.4
Sco Unixware 2.1
Sun Sunos 5.5.1
NA
CVE-2000-0307
Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and previous versions allows an malicious user to cause a denial of service which prevents access to reserved port numbers below 1024.
Sco Open Desktop
Sco Openserver
Sco Unixware
NA
CVE-1999-0023
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
Inet Inet 5.01
Inet Inet 6.01
Sco Openserver 5.0
Sco Open Desktop 3.0
Sun Sunos 5.3
Sun Sunos 4.1.4
Sco Openserver 2.0
Ibm Aix 4.2
Freebsd Freebsd 2.0.5
Sco Open Desktop 2.0
Sco Openserver 5.0.2
Sco Internet Faststart 1.0
Sun Sunos 5.5
Sco Tcp Ip 1.2.1
Sco Unixware 2.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.1.0
Ibm Aix 4.1
Sun Sunos 5.5.1
Sun Sunos 4.1.3u1
Bsdi Bsd Os
Freebsd Freebsd 2.0
1 EDB exploit
NA
CVE-1999-0693
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
Ibm Aix 4
Sco Unixware 7
Hp Hp-ux 10
Hp Hp-ux 11
1 EDB exploit
NA
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Isc Bind 4.9
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 8
Redhat Linux 4.2
Redhat Linux 5.0
Sco Open Desktop 3.0
Sco Openserver 5.0
Ibm Aix 4.1
Ibm Aix 4.2
Ibm Aix 4.3
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Sunos 5.6
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3.1
Sco Unix 3.2v4
Sco Unixware 7.0
NA
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Data General Dg Ux Y2k Patchr4.20mu03
Isc Bind 4.9
Isc Bind 8
Data General Dg Ux Y2k Patchr4.11mu05
Data General Dg Ux Y2k Patchr4.20mu01
Data General Dg Ux Y2k Patchr4.12mu03
Data General Dg Ux Y2k Patchr4.20mu02
Sco Unixware 2.1
Sco Unixware 7.0
Sun Sunos 5.3
Sun Sunos 5.4
Nec Asl Ux 4800 13
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Redhat Linux 4.2
Ibm Aix 4.2
Nec Asl Ux 4800 11
Redhat Linux 5.0
Sco Openserver 5.0
Sun Sunos 5.5.1
Ibm Aix 4.1
Ibm Aix 4.3
NA
CVE-1999-0024
DNS cache poisoning via BIND, by predictable query IDs.
Isc Bind 8.1
Isc Bind 4.9.5
Sco Openserver 5.0
Sco Open Desktop 3.0
Sun Sunos 5.3
Nec Ews-ux V 4.2mp
Sun Solaris 2.4
Sun Solaris 2.5.1
Sun Solaris 2.5
Ibm Aix 4.2
Nec Asl Ux 4800 64
Sun Sunos 5.5
Bsdi Bsd Os 3.0
Nec Ews-ux V 4.2
Sco Unixware 2.1
Bsdi Bsd Os 2.1
Sco Unix 3.2v4
Nec Up-ux V 4.2mp
Sun Sunos -
Sun Sunos 5.4
Sun Solaris 2.6
Ibm Aix 4.1
NA
CVE-1999-0078
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
Ncr Mp-ras 3.0
Ncr Mp-ras 2.03
Sgi Irix 5.3
Ncr Mp-ras 3.01
Next Nextstep
Ibm Aix 4.2
Sun Sunos 5.5
Sco Unixware 2.1
Freebsd Freebsd 6.2
Sco Openserver 5
Sun Sunos 4.1
Sun Sunos 5.4
Nec Up-ux V
Ibm Aix 4.1
Bsdi Bsd Os
Ibm Aix 3.2
Hp Hp-ux
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »