Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Sun:
>> Sunos
>> 5.3
Security Vulnerabilities
CVE-1999-1158
Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-05-13
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
CVSS Score
7.2
EPSS Score
0.003
Published
1997-05-01
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
CVSS Score
8.4
EPSS Score
0.001
Published
1997-04-26
CVE-1999-0315
Buffer overflow in Solaris fdformat command gives root access to local users.
CVSS Score
7.2
EPSS Score
0.003
Published
1997-04-01
CVE-1999-0165
NFS cache poisoning.
CVSS Score
10.0
EPSS Score
0.005
Published
1997-03-01
CVE-1999-0046
Buffer overflow of rlogin program using TERM environmental variable.
CVSS Score
10.0
EPSS Score
0.035
Published
1997-02-06
CVE-1999-0369
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.
CVSS Score
7.2
EPSS Score
0.004
Published
1997-02-01
CVE-1999-0345
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
CVSS Score
5.0
EPSS Score
0.005
Published
1997-01-01
CVE-1999-0129
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
CVSS Score
4.6
EPSS Score
0.001
Published
1996-12-03
CVE-1999-0132
Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access.
CVSS Score
2.1
EPSS Score
0.006
Published
1996-08-15
Prev
Next
Page 9
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved