CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The cancel command in Solaris 2.6 (i386) has a buffer overflow that allows local users to obtain root access. |
64 bit Solaris 7 procfs allows local users to perform a denial of service. |
The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. |
Solaris ff.core allows local users to modify files. |
The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. |
rpc.admind in Solaris is not running in a secure mode. |
smcboot in Sun SMC (Sun Management Center) 2.0 in Solaris 8 allows local users to delete arbitrary files via a symlink attack on /tmp/smc$SMC_PORT. |
A version of rusers is running that exposes valid user information to any entity on the network. |
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host. |
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. |
Directory traversal vulnerability in none.php for SunPS iRunbook 2.5.2 allows remote attackers to read arbitrary files via a "..:" sequence (dot-dot variant) in the argument. |
none.php for SunPS iRunbook 2.5.2 allows remote attackers to read arbitrary files via an absolute pathname in the argument. |
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. |
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). |
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. |
The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. |
admintool in Solaris allows a local user to write to arbitrary files and gain root access. |
vold in Solaris 2.x allows local users to gain root access. |
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. |
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. |