Vulnerabilities > SUN > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-12-22 | CVE-2000-0030 | Unspecified vulnerability in SUN Solaris and Sunos Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database. | 5.0 |
1999-11-19 | CVE-1999-0831 | Denial of service in Linux syslogd via a large number of connections. | 5.0 |
1999-11-10 | CVE-1999-0848 | Denial of service in BIND named via consuming more than "fdmax" file descriptors. | 5.0 |
1999-09-23 | CVE-1999-0908 | Unspecified vulnerability in SUN Solaris and Sunos Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. | 5.0 |
1999-09-22 | CVE-1999-0786 | Unspecified vulnerability in SUN Solaris and Sunos The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. | 4.6 |
1999-09-13 | CVE-1999-1014 | Unspecified vulnerability in SUN Solaris and Sunos Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument. | 4.6 |
1999-06-10 | CVE-1999-1023 | Unspecified vulnerability in SUN Sunos 5.7 useradd in Solaris 7.0 does not properly interpret certain date formats as specified in the "-e" (expiration date) argument, which could allow users to login after their accounts have expired. | 4.6 |
1999-02-10 | CVE-1999-0370 | Unspecified vulnerability in SUN Solaris and Sunos In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files. | 4.6 |
1998-11-12 | CVE-1999-1025 | Unspecified vulnerability in SUN Solaris and Sunos CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string. | 4.6 |
1998-07-16 | CVE-1999-0263 | Unspecified vulnerability in SUN Sunos Solaris SUNWadmap can be exploited to obtain root access. | 4.6 |