cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-04-24
Updated
2018-10-30
Buffer overflow in Solaris netpr program allows local users to execute arbitrary commands via a long -p option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-05-12
Updated
2018-10-30
Buffer overflow in ximp40 shared library in Solaris 7 and Solaris 8 allows local users to gain privileges via a long "arg0" (process name) argument.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-05-03
Updated
2018-10-30
Buffer overflow in Solaris snmpXdmid SNMP to DMI mapper daemon allows remote attackers to execute arbitrary commands via a long "indication" event.
Max CVSS
10.0
EPSS Score
78.02%
Published
2001-05-03
Updated
2018-10-30
Buffer overflow in the line printer daemon (in.lpd) for Solaris 8 and earlier allows local and remote attackers to gain root privileges via a "transfer job" routine.
Max CVSS
10.0
EPSS Score
0.56%
Published
2001-07-21
Updated
2018-10-30
Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-07-02
Updated
2018-10-30
Buffer overflow in the Xview library as used by mailtool in Solaris 8 and earlier allows a local attacker to gain privileges via the OPENWINHOME environment variable.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-08-14
Updated
2018-05-03
Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option.
Max CVSS
4.6
EPSS Score
0.05%
Published
2001-08-14
Updated
2018-10-30
kcms_configure as included with Solaris 7 and 8 allows a local attacker to gain additional privileges via a buffer overflow in a command line argument.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-08-02
Updated
2018-10-30
Buffer overflow in mail included with SunOS 5.8 for x86 allows a local user to gain privileges via a long HOME environment variable.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-09-20
Updated
2018-05-03
Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
Max CVSS
10.0
EPSS Score
19.47%
Published
2001-10-18
Updated
2018-10-30

CVE-2001-0797

Public exploit
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Max CVSS
10.0
EPSS Score
97.24%
Published
2001-12-12
Updated
2018-10-30
Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-07-05
Updated
2018-10-30
The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root.
Max CVSS
7.5
EPSS Score
3.20%
Published
2001-10-09
Updated
2018-10-30
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host.
Max CVSS
2.1
EPSS Score
0.21%
Published
2001-12-31
Updated
2018-10-30
pt_chmod in Solaris 8 does not call fdetach to reset terminal privileges when users log out of terminals, which allows local users to write to other users' terminals by modifying the ACL of a TTY.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-12-31
Updated
2018-10-30
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name.
Max CVSS
10.0
EPSS Score
19.35%
Published
2002-05-29
Updated
2018-10-30
Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.
Max CVSS
7.2
EPSS Score
54.42%
Published
2002-03-15
Updated
2018-10-30
cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request.
Max CVSS
5.0
EPSS Score
2.91%
Published
2002-03-15
Updated
2018-10-30
Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-03-15
Updated
2018-10-30
Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file.
Max CVSS
7.2
EPSS Score
0.08%
Published
2002-03-15
Updated
2018-10-30
Buffer overflow in Low BandWidth X proxy (lbxproxy) in Solaris 8 allows local users to execute arbitrary code via a long display command line option.
Max CVSS
7.2
EPSS Score
0.07%
Published
2002-03-15
Updated
2017-10-10
Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-04-02
Updated
2018-10-30
sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
Max CVSS
10.0
EPSS Score
1.69%
Published
2002-07-26
Updated
2018-10-30
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
Max CVSS
7.2
EPSS Score
0.04%
Published
2002-07-03
Updated
2018-10-30
126 vulnerabilities found
1 2 3 4 5 6
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!