CVE-2001-1583

Public exploit
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
Max CVSS
10.0
EPSS Score
19.96%
Published
2001-12-31
Updated
2022-09-13

CVE-2001-0797

Public exploit
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Max CVSS
10.0
EPSS Score
97.24%
Published
2001-12-12
Updated
2018-10-30
Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
Max CVSS
10.0
EPSS Score
19.47%
Published
2001-10-18
Updated
2018-10-30
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Max CVSS
10.0
EPSS Score
0.92%
Published
2001-08-14
Updated
2022-01-21
Buffer overflow in the line printer daemon (in.lpd) for Solaris 8 and earlier allows local and remote attackers to gain root privileges via a "transfer job" routine.
Max CVSS
10.0
EPSS Score
0.56%
Published
2001-07-21
Updated
2018-10-30
pam_ldap authentication module in Solaris 8 allows remote attackers to bypass authentication via a NULL password.
Max CVSS
10.0
EPSS Score
0.51%
Published
2001-05-03
Updated
2018-10-30
Buffer overflow in Solaris snmpXdmid SNMP to DMI mapper daemon allows remote attackers to execute arbitrary commands via a long "indication" event.
Max CVSS
10.0
EPSS Score
78.02%
Published
2001-05-03
Updated
2018-10-30
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!