Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Sun:
>> Sunos
>> 4.1.3
Security Vulnerabilities
CVE-1999-1192
Buffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-06-24
CVE-1999-1191
Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument.
CVSS Score
7.2
EPSS Score
0.002
Published
1997-05-19
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
CVSS Score
7.2
EPSS Score
0.003
Published
1997-05-01
CVE-1999-0165
NFS cache poisoning.
CVSS Score
10.0
EPSS Score
0.009
Published
1997-03-01
CVE-1999-0298
ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.
CVSS Score
7.5
EPSS Score
0.016
Published
1997-02-05
CVE-1999-0369
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.
CVSS Score
7.2
EPSS Score
0.004
Published
1997-02-01
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
CVSS Score
7.2
EPSS Score
0.002
Published
1997-01-06
CVE-1999-0217
Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems.
CVSS Score
5.0
EPSS Score
0.005
Published
1997-01-01
CVE-1999-0345
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
CVSS Score
5.0
EPSS Score
0.005
Published
1997-01-01
CVE-1999-0132
Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access.
CVSS Score
2.1
EPSS Score
0.004
Published
1996-08-15
Prev
Next
Page 6
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved