Vulnerabilities
Vulnerable Software
Sun:  >> Sunos  >> 5.8  Security Vulnerabilities
Buffer overflow in Solaris snmpXdmid SNMP to DMI mapper daemon allows remote attackers to execute arbitrary commands via a long "indication" event.
CVSS Score
10.0
EPSS Score
0.777
Published
2001-05-03
pam_ldap authentication module in Solaris 8 allows remote attackers to bypass authentication via a NULL password.
CVSS Score
10.0
EPSS Score
0.006
Published
2001-05-03
Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0).
CVSS Score
7.2
EPSS Score
0.001
Published
2001-03-26
catman in Solaris 2.7 and 2.8 allows local users to overwrite arbitrary files via a symlink attack on the sman_PID temporary file.
CVSS Score
1.2
EPSS Score
0.001
Published
2001-02-12
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
CVSS Score
10.0
EPSS Score
0.009
Published
2000-11-14
Buffer overflow in ufsrestore in Solaris 8 and earlier allows local users to gain root privileges via a long pathname.
CVSS Score
7.2
EPSS Score
0.003
Published
2000-06-14
Buffer overflow in Solaris netpr program allows local users to execute arbitrary commands via a long -p option.
CVSS Score
7.2
EPSS Score
0.002
Published
2000-05-12
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
CVSS Score
7.2
EPSS Score
0.001
Published
2000-04-24
/usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option.
CVSS Score
2.1
EPSS Score
0.001
Published
1999-12-31
Vacation program allows command execution by remote users through a sendmail command.
CVSS Score
7.5
EPSS Score
0.029
Published
1998-11-16


Contact Us

Shodan ® - All rights reserved