CVE-2001-0403 – Junsoft JSparm 4.0 - Logging Output File
https://notcve.org/view.php?id=CVE-2001-0403
/opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI. • https://www.exploit-db.com/exploits/20715 http://archives.neohapsis.com/archives/bugtraq/2001-03/0326.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6267 •
CVE-2001-0470
https://notcve.org/view.php?id=CVE-2001-0470
Buffer overflow in SNMP proxy agent snmpd in Solaris 8 may allow local users to gain root privileges by calling snmpd with a long program name. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0160.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0181.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6239 •
CVE-2001-0401 – Solaris 2.5/2.6/7.0/8 tip - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0401
Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •
CVE-2001-0426 – SGI IRIX 6.5 / Solaris 7.0/8 CDE - '/usr/dt/bin/dtsession' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0426
Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable. • https://www.exploit-db.com/exploits/20766 http://archives.neohapsis.com/archives/bugtraq/2001-04/0203.html •
CVE-2001-0421 – Solaris 2.6 - FTP Core Dump Shadow Password Recovery
https://notcve.org/view.php?id=CVE-2001-0421
FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •