Vulnerabilities > SUN
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1995-11-01 | CVE-1999-0241 | Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. | 10.0 |
1995-10-19 | CVE-1999-0099 | Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. | 10.0 |
1995-08-29 | CVE-1999-0164 | Unspecified vulnerability in SUN Sunos 5.3/5.4 A race condition in the Solaris ps command allows an attacker to overwrite critical files. | 6.2 |
1995-08-23 | CVE-1999-1580 | SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. | 7.2 |
1995-05-10 | CVE-1999-1080 | Unspecified vulnerability in SUN Sunos 5.7 rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf. | 7.2 |
1994-05-13 | CVE-1999-1388 | Unspecified vulnerability in SUN Sunos 4.1 passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument. | 6.2 |
1994-03-21 | CVE-1999-0120 | Unspecified vulnerability in SUN Sunos 4.1 Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. | 7.2 |
1993-12-16 | CVE-1999-0334 | Unspecified vulnerability in SUN Solaris and Sunos In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access. | 7.2 |
1993-10-01 | CVE-1999-1137 | Unspecified vulnerability in SUN Solaris and Sunos The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. | 2.1 |
1993-09-17 | CVE-1999-1318 | Unspecified vulnerability in SUN Sunos /usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. | 7.2 |