Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Sun:
>> Solaris
>> 7.0
Security Vulnerabilities
CVE-1999-0977
Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request.
CVSS Score
10.0
EPSS Score
0.059
Published
1999-12-10
CVE-1999-0974
Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.
CVSS Score
10.0
EPSS Score
0.024
Published
1999-12-09
CVE-1999-0973
Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode.
CVSS Score
10.0
EPSS Score
0.031
Published
1999-12-07
CVE-1999-0859
Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly.
CVSS Score
2.1
EPSS Score
0.002
Published
1999-12-01
CVE-1999-0860
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack.
CVSS Score
2.1
EPSS Score
0.002
Published
1999-12-01
CVE-1999-0818
Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable.
CVSS Score
7.2
EPSS Score
0.004
Published
1999-11-20
CVE-1999-0833
Buffer overflow in BIND 8.2 via NXT records.
CVSS Score
7.5
EPSS Score
0.015
Published
1999-11-10
CVE-1999-0837
Denial of service in BIND by improperly closing TCP sessions via so_linger.
CVSS Score
10.0
EPSS Score
0.011
Published
1999-11-10
CVE-1999-0848
Denial of service in BIND named via consuming more than "fdmax" file descriptors.
CVSS Score
5.0
EPSS Score
0.102
Published
1999-11-10
CVE-1999-0948
Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-11-02
Prev
Next
Page 14
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved