Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Sun:
>> Solaris
Security Vulnerabilities
CVE-1999-0859
Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly.
CVSS Score
2.1
EPSS Score
0.002
Published
1999-12-01
CVE-1999-0860
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack.
CVSS Score
2.1
EPSS Score
0.002
Published
1999-12-01
CVE-1999-0818
Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable.
CVSS Score
7.2
EPSS Score
0.004
Published
1999-11-20
CVE-1999-0833
Buffer overflow in BIND 8.2 via NXT records.
CVSS Score
7.5
EPSS Score
0.015
Published
1999-11-10
CVE-1999-0837
Denial of service in BIND by improperly closing TCP sessions via so_linger.
CVSS Score
10.0
EPSS Score
0.011
Published
1999-11-10
CVE-1999-0848
Denial of service in BIND named via consuming more than "fdmax" file descriptors.
CVSS Score
5.0
EPSS Score
0.102
Published
1999-11-10
CVE-1999-0948
Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-11-02
CVE-1999-0949
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-11-02
CVE-1999-0908
Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter.
CVSS Score
5.0
EPSS Score
0.038
Published
1999-09-23
CVE-1999-0786
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack.
CVSS Score
4.6
EPSS Score
0.002
Published
1999-09-22
Prev
Next
Page 47
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved