| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| An SNMP community name is the default (e.g. public), null, or missing. |
| Unknown vulnerability in the TCP/IP stack for Sun Solaris 8 and 9 allows local users to cause a denial of service (system panic) via unknown vectors. |
| The cancel command in Solaris 2.6 (i386) has a buffer overflow that allows local users to obtain root access. |
| Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. |
| Local user gains root privileges via buffer overflow in rdist, via expstr() function. |
| Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
| Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. |
| Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. |
| Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. |
| In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system. |
| The passwd command in Solaris can be subjected to a denial of service. |
| Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters. |
| Denial of service by sending forged ICMP unreachable packets. |
| Solaris SUNWadmap can be exploited to obtain root access. |
| Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges. |
| Vacation program allows command execution by remote users through a sendmail command. |
| Buffer overflow in SGI IRIX mailx program. |
| Unspecified vulnerability in Sun Solaris 8 and 9 before 20060821 allows local users to execute arbitrary commands via unspecified vectors, involving the default Role-Based Access Control (RBAC) settings in the "File System Management" profile. |
| Unspecified vulnerability in the pagedata subsystem of the process file system (/proc) in Solaris 8 through 10 allows local users to cause a denial of service (system hang or panic) via unknown attack vectors that cause cause the kmem_oversize arena to allocate a large amount of system memory that does not get freed. |
| The Solaris Management Console (SMC) GUI for Solaris 8 and 9, when creating user accounts that are configured for password aging, creates the accounts with a blank password, which allows remote or local attackers to break into those accounts. |