| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. |
| Buffer overflow in xlock program allows local users to execute commands as root. |
| Command execution in Sun systems via buffer overflow in the at program. |
| Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. |
| DNS cache poisoning via BIND, by predictable query IDs. |
| Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
| Local user gains root privileges via buffer overflow in rdist, via expstr() function. |
| Land IP denial of service. |
| Teardrop IP denial of service. |
| Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. |
| Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. |
| Delete or create a file via rpc.statd, due to invalid information. |
| The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. |
| Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. |
| Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters. |
| nis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers. |
| SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files. |
| The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access. |
| rpc.admind in Solaris is not running in a secure mode. |
| The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. |