CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
20h00 +00:00 |
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. | 7.2 |
||
19h00 +00:00 |
Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow. | 7.5 |
||
19h00 +00:00 |
Unspecified vulnerability in IBM Tivoli Monitoring Agent (ITMA), as used in IBM DB2 9.5 before FP9 on UNIX, allows local users to gain privileges via unknown vectors. | 7.2 |
||
20h00 +00:00 |
The Matrix3D component in Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 10 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors. | 5 |
||
02h00 +00:00 |
eEye Audit ID 2499 in eEye Digital Security Audits 2406 through 2423 for eEye Retina Network Security Scanner on HP-UX, IRIX, and Solaris allows local users to gain privileges via a Trojan horse gauntlet program in an arbitrary directory under /usr/local/. | 6.9 |
||
01h00 +00:00 |
The GetInstalledPackages function in the configuration tool in HP Application Lifestyle Management (ALM) 11 on AIX, HP-UX, and Solaris allows local users to gain privileges via (1) a Trojan horse /tmp/tmp.txt FIFO or (2) a symlink attack on /tmp/tmp.txt. | 4.6 |
||
01h00 +00:00 |
Unspecified vulnerability in HP Operations Agent 11.00 and Performance Agent 4.73 and 5.0 on AIX, HP-UX, Linux, and Solaris allows local users to bypass intended directory-access restrictions via unknown vectors. | 3.2 |
||
23h00 +00:00 |
Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via unspecified vectors. | 9.3 |
||
23h00 +00:00 |
Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service via unspecified vectors. | 9.3 |
||
23h00 +00:00 |
Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service (browser crash) via unspecified vectors, related to a "logic error issue." | 9.3 |
||
23h00 +00:00 |
Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, related to a "security control bypass." | 5 |
||
23h00 +00:00 |
Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via crafted streaming media, related to a "logic error vulnerability." | 9.3 |
||
23h00 +00:00 |
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, related to a "universal cross-site scripting issue," as exploited in the wild in September 2011. | 4.3 |
||
19h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SWF file, as demonstrated by "about 400 unique crash signatures." | 9.3 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425. | 10 |
||
20h00 +00:00 |
Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416. | 10 |
||
20h00 +00:00 |
Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416. | 10 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors. | 6.4 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425. | 10 |
||
20h00 +00:00 |
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415. | 10 |
||
20h00 +00:00 |
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414. | 10 |
||
20h00 +00:00 |
Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138. | 10 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425. | 10 |
||
20h00 +00:00 |
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417. | 10 |
||
19h16 +00:00 |
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415. | 10 |
||
19h16 +00:00 |
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415. | 10 |
||
19h16 +00:00 |
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415. | 10 |
||
21h00 +00:00 |
Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011. | 10 |
||
17h00 +00:00 |
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlier on Android, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to a "universal cross-site scripting vulnerability." | 4.3 |
||
10h00 +00:00 |
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.62 (aka 6.0.0.8-TIV-ITDS-IF0004) on Linux, Solaris, and Windows allows remote authenticated users to cause a denial of service (ABEND) via a malformed LDAP extended operation that triggers certain comparisons involving the NULL operation OID. | 4 |
||
21h00 +00:00 |
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220. | 10 |
||
22h00 +00:00 |
Unspecified vulnerability in the XView library (libxview.so) in Solaris 2.5 to 10 allows local users to corrupt files via unknown vectors related to the handling of the clipboard selection while an XView application exits. | 3.6 |
||
21h17 +00:00 |
Unknown vulnerability in the System Serial Console terminal in Solaris 2.5.1, 2.6, and 7 allows local users to monitor keystrokes and possibly steal sensitive information. | 4.9 |
||
04h00 +00:00 |
pkgadd in Sun Solaris 2.5.1 through 8 installs files setuid/setgid root if the pkgmap file contains a "?" (question mark) in the (1) mode, (2) owner, or (3) group fields, which allows attackers to elevate privileges. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in Volume Manager daemon (vold) of Sun Solaris 2.5.1 through 8 allows local users to execute arbitrary code via unknown attack vectors. | 7.2 |
||
02h00 +00:00 |
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host. | 2.1 |
||
04h00 +00:00 |
The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. | 7.5 |
||
04h00 +00:00 |
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges. | 10 |
||
04h00 +00:00 |
Solaris 2.5.1 through 9 allows local users to cause a denial of service (kernel panic) by setting the sd_struiowrq variable in the struioget function to null, which triggers a null dereference. | 2.1 |
||
04h00 +00:00 |
The libthread library (libthread.so.1) for Solaris 2.5.1 through 8 allows local users to cause a denial of service (hang) of an application that uses libthread by causing the application to wait for a certain mutex. | 2.1 |
||
04h00 +00:00 |
Unknown vulnerability in the libraries for the PGX32 frame buffer in Solaris 2.5.1 and 2.6 through 9 allows local users to gain root access. | 7.2 |
||
04h00 +00:00 |
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header. | 2.1 |
||
04h00 +00:00 |
A race condition in the at command for Solaris 2.6 through 9 allows local users to delete arbitrary files via the -r argument with .. (dot dot) sequences in the job name, then modifying the directory structure after at checks permissions to delete the file and before the deletion actually takes place. | 1.2 |
||
04h00 +00:00 |
Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. | 5 |
||
02h00 +00:00 |
Buffer overflow in ypbind daemon in Solaris 5.4 through 8 allows remote attackers to execute arbitrary code. | 7.5 |
||
02h00 +00:00 |
Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query. | 7.5 |
||
02h00 +00:00 |
Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure. | 5 |
||
02h00 +00:00 |
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. | 7.5 |
||
02h00 +00:00 |
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201. | 10 |
||
02h00 +00:00 |
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code. | 10 |
||
03h00 +00:00 |
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd. | 9.8 |
Critical |
|
03h00 +00:00 |
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. | 7.2 |
||
03h00 +00:00 |
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. | 10 |
||
03h00 +00:00 |
Stack-based buffer overflow in the bsd_queue() function for lpq on Solaris 2.6 and 7 allows local users to gain root privilege. | 7.2 |
||
03h00 +00:00 |
Heap-based buffer overflow in dtsession for Solaris 2.5.1 through Solaris 9 allows local users to gain root privileges via a long HOME environment variable. | 7.2 |
||
03h00 +00:00 |
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. | 10 |
||
04h00 +00:00 |
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. | 7.5 |
||
02h00 +00:00 |
Unknown vulnerability in NFS on Solaris 2.5.1 through Solaris 9 allows an NFS client to cause a denial of service by killing the lockd daemon. | 5 |
||
02h00 +00:00 |
CDE ToolTalk database server (ttdbserver) allows remote attackers to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure. | 7.5 |
||
02h00 +00:00 |
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. | 10 |
||
02h00 +00:00 |
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. | 7.2 |
||
02h00 +00:00 |
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. | 5 |
||
04h00 +00:00 |
The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. | 2.1 |
||
04h00 +00:00 |
Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. | 7.2 |
||
04h00 +00:00 |
The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. | 2.1 |
||
04h00 +00:00 |
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i. | 2.1 |
||
04h00 +00:00 |
Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges. | 7.5 |
||
04h00 +00:00 |
Buffer overflow in Xsun in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. | 10 |
||
04h00 +00:00 |
Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. | 4.6 |
||
04h00 +00:00 |
Heap overflow in xlock in Solaris 2.6 through 8 allows local users to gain root privileges via a long (1) XFILESEARCHPATH or (2) XUSERFILESEARCHPATH environmental variable. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in /usr/bin/write in Solaris 2.6 and 7 allows local users to gain privileges via a long string in the terminal name argument. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. | 7.2 |
||
02h00 +00:00 |
FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. | 6.4 |
||
02h00 +00:00 |
Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in exrecover in Solaris 2.6 and earlier possibly allows local users to gain privileges via a long command line argument. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0). | 7.2 |
||
04h00 +00:00 |
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. | 10 |
||
04h00 +00:00 |
Heap overflow in savestr function in LBNL traceroute 1.4a5 and earlier allows a local user to execute arbitrary commands via the -g option. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in ufsrestore in Solaris 8 and earlier allows local users to gain root privileges via a long pathname. | 7.2 |
||
02h00 +00:00 |
Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters. | 10 |
||
02h00 +00:00 |
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. | 7.5 |
||
02h00 +00:00 |
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). | 10 |
||
02h00 +00:00 |
Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly. | 2.1 |
||
02h00 +00:00 |
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. | 4.6 |
||
04h00 +00:00 |
Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. | 7.5 |
||
04h00 +00:00 |
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. | 4.6 |
||
04h00 +00:00 |
NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries. | 2.6 |
||
04h00 +00:00 |
Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. | 5 |
||
04h00 +00:00 |
Command execution in Sun systems via buffer overflow in the at program. | 7.2 |
||
04h00 +00:00 |
libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind. | 10 |
||
04h00 +00:00 |
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems. | 5 |
||
04h00 +00:00 |
In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files. | 4.6 |
||
04h00 +00:00 |
A Unix account has a default, null, blank, or missing password. | 7.5 |
||
04h00 +00:00 |
The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches. | 7.5 |
||
04h00 +00:00 |
Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack. | 2.1 |
||
04h00 +00:00 |
Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. | 7.2 |
||
04h00 +00:00 |
Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server. | 7.8 |
||
04h00 +00:00 |
Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable. | 7.2 |
||
04h00 +00:00 |
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. | 7.2 |
||
04h00 +00:00 |
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | 7.5 |
||
04h00 +00:00 |
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode. | 10 |
||
04h00 +00:00 |
Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. | 10 |
||
04h00 +00:00 |
Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request. | 10 |
||
02h00 +00:00 |
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). | 10 |
||
02h00 +00:00 |
Buffer overflow in NIS+, in Sun's rpc.nisd program. | 10 |
||
02h00 +00:00 |
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | 10 |
||
02h00 +00:00 |
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. | 5 |
||
02h00 +00:00 |
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. | 10 |
||
02h00 +00:00 |
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. | 7.5 |
||
02h00 +00:00 |
Buffer overflow in statd allows root privileges. | 10 |
||
02h00 +00:00 |
Local user gains root privileges via buffer overflow in rdist, via lookup() function. | 7.2 |
||
02h00 +00:00 |
DNS cache poisoning via BIND, by predictable query IDs. | 5 |
||
02h00 +00:00 |
Buffer overflow in xlock program allows local users to execute commands as root. | 8.4 |
High |
|
02h00 +00:00 |
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. | 7.2 |
||
02h00 +00:00 |
Buffer overflow of rlogin program using TERM environmental variable. | 10 |
||
02h00 +00:00 |
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. | 7.2 |
||
02h00 +00:00 |
Sun's ftpd daemon can be subjected to a denial of service. | 5 |
||
02h00 +00:00 |
Buffer overflows in Sun libnsl allow root access. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in Sun's ping program can give root access to local users. | 7.2 |
||
02h00 +00:00 |
Vacation program allows command execution by remote users through a sendmail command. | 7.5 |
||
02h00 +00:00 |
Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. | 7.5 |
||
02h00 +00:00 |
Solaris ufsrestore buffer overflow. | 8.4 |
High |
|
02h00 +00:00 |
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character). | 10 |
||
02h00 +00:00 |
Buffer overflow in ffbconfig in Solaris 2.5.1. | 7.2 |
||
02h00 +00:00 |
Buffer overflow in SGI IRIX mailx program. | 4.6 |
||
02h00 +00:00 |
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death. | 5 |
||
02h00 +00:00 |
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. | 4.6 |
||
02h00 +00:00 |
vold in Solaris 2.x allows local users to gain root access. | 7.2 |
||
02h00 +00:00 |
admintool in Solaris allows a local user to write to arbitrary files and gain root access. | 7.2 |
||
02h00 +00:00 |
Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access. | 7.2 |
||
02h00 +00:00 |
In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution. | 7.5 |
||
02h00 +00:00 |
The passwd command in Solaris can be subjected to a denial of service. | 7.2 |
||
02h00 +00:00 |
Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. | 7.2 |
||
02h00 +00:00 |
Denial of service through Solaris 2.5.1 telnet by sending ^D characters. | 5 |
||
02h00 +00:00 |
Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges. | 7.2 |
||
02h00 +00:00 |
nis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers. | 7.5 |
||
02h00 +00:00 |
Buffer overflow in SunOS/Solaris ps command. | 7.2 |
||
02h00 +00:00 |
SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server. | 7.5 |
||
02h00 +00:00 |
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames. | 4.6 |
||
02h00 +00:00 |
Buffer overflow in Solaris fdformat command gives root access to local users. | 7.2 |
||
02h00 +00:00 |
SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files. | 9.3 |
||
02h00 +00:00 |
Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. | 7.2 |
||
02h00 +00:00 |
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access. | 7.2 |
||
02h00 +00:00 |
Solaris ff.core allows local users to modify files. | 2.1 |
||
02h00 +00:00 |
ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service. | 5 |