Product:

Solaris

(Sun)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 456
Date Id Summary Products Score Patch Annotated
2000-04-24 CVE-2000-0316 Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option. Solaris, Sunos N/A
1999-06-09 CVE-2000-0118 The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. Linux, Solaris, Sunos N/A
2000-01-06 CVE-2000-0055 Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. Solaris, Sunos N/A
1999-12-22 CVE-2000-0032 Solaris dmi_cmd allows local users to crash the dmispd daemon by adding a malformed file to the /var/dmi/db database. Solaris, Sunos N/A
1999-12-22 CVE-2000-0030 Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database. Solaris, Sunos N/A
1999-12-31 CVE-1999-1587 /usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option. Solaris, Sunos N/A
1998-07-16 CVE-1999-1432 Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges. Solaris, Sunos N/A
1997-06-26 CVE-1999-1423 ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i. Solaris, Sunos N/A
1997-07-30 CVE-1999-1419 Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges. Solaris, Sunos N/A
1996-08-03 CVE-1999-1413 Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg. Solaris, Sunos N/A