Search Results (559 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-0952 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in Solaris lpstat via class argument allows local users to gain root access.
CVE-1999-0948 3 Sgi, Sun, Turbolinux 4 Irix, Solaris, Sunos and 1 more 2025-04-03 N/A
Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
CVE-1999-0860 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack.
CVE-1999-0859 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly.
CVE-1999-0837 2 Isc, Sun 3 Bind, Solaris, Sunos 2025-04-03 N/A
Denial of service in BIND by improperly closing TCP sessions via so_linger.
CVE-1999-0773 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in Solaris lpset program allows local users to gain root access.
CVE-1999-0691 4 Cde, Digital, Ibm and 1 more 5 Cde, Unix, Aix and 2 more 2025-04-03 N/A
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
CVE-1999-1413 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.
CVE-1999-1423 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i.
CVE-1999-1432 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges.
CVE-2001-0115 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter.
CVE-1999-0097 3 Hp, Ibm, Sun 4 Hp-ux, Aix, Solaris and 1 more 2025-04-03 N/A
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
CVE-2005-3781 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Unspecified vulnerability in in.named in Solaris 9 allows attackers to cause a denial of service via unknown manipulations that cause in.named to "make unnecessary queries."
CVE-2001-0401 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable.
CVE-2001-0421 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition.
CVE-2005-3001 1 Sun 1 Solaris 2025-04-03 N/A
Unspecified vulnerability in the "tl" driver in Solaris 10 allows local users to cause a denial of service (panic) via unknown vectors.
CVE-1999-1025 1 Sun 2 Solaris, Sunos 2025-04-03 N/A
CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string.
CVE-1999-1026 1 Sun 1 Solaris 2025-04-03 N/A
aspppd on Solaris 2.5 x86 allows local users to modify arbitrary files and gain root privileges via a symlink attack on the /tmp/.asppp.fifo file.
CVE-1999-1027 1 Sun 1 Solaris 2025-04-03 N/A
Solaris 2.6 HW3/98 installs admintool with world-writable permissions, which allows local users to gain privileges by replacing it with a Trojan horse program.