Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Sun:
>> Sunos
>> 5.4
Security Vulnerabilities
CVE-1999-0212
Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server.
CVSS Score
7.8
EPSS Score
0.007
Published
1998-04-29
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVSS Score
10.0
EPSS Score
0.805
Published
1998-04-08
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
CVSS Score
5.0
EPSS Score
0.02
Published
1998-04-08
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
CVSS Score
5.4
EPSS Score
0.11
Published
1998-04-08
CVE-1999-0190
Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-04-08
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
CVSS Score
10.0
EPSS Score
0.903
Published
1998-04-01
CVE-1999-0320
SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files.
CVSS Score
9.3
EPSS Score
0.005
Published
1998-03-01
CVE-1999-0795
The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches.
CVSS Score
7.5
EPSS Score
0.008
Published
1998-03-01
CVE-1999-0513
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service.
CVSS Score
5.0
EPSS Score
0.256
Published
1998-01-05
CVE-1999-0017
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
CVSS Score
7.5
EPSS Score
0.011
Published
1997-12-10
Prev
Next
Page 8
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved