CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. |
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. |
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). |
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. |
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. |
Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable. |
Buffer overflow in BIND 8.2 via NXT records. |
Denial of service in BIND by improperly closing TCP sessions via so_linger. |
Denial of service in BIND named via consuming more than "fdmax" file descriptors. |
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack. |
DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes. |
Buffer overflow in uum program for Canna input system allows local users to gain root privileges. |
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. |
Buffer overflow in Solaris lpstat via class argument allows local users to gain root access. |
Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode. |
The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file. |
CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string. |
Solaris 2.6 HW3/98 installs admintool with world-writable permissions, which allows local users to gain privileges by replacing it with a Trojan horse program. |
The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. |
Unspecified vulnerability in the pagedata subsystem of the process file system (/proc) in Solaris 8 through 10 allows local users to cause a denial of service (system hang or panic) via unknown attack vectors that cause cause the kmem_oversize arena to allocate a large amount of system memory that does not get freed. |