CVE-2001-0269
https://notcve.org/view.php?id=CVE-2001-0269
pam_ldap authentication module in Solaris 8 allows remote attackers to bypass authentication via a NULL password. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0344.html http://www.osvdb.org/6030 https://exchange.xforce.ibmcloud.com/vulnerabilities/6440 •
CVE-2001-0236 – Solaris 2.6/7.0/8 - snmpXdmid Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0236
Buffer overflow in Solaris snmpXdmid SNMP to DMI mapper daemon allows remote attackers to execute arbitrary commands via a long "indication" event. • https://www.exploit-db.com/exploits/20648 https://www.exploit-db.com/exploits/20649 http://marc.info/?l=bugtraq&m=98462536724454&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/207 http://www.cert.org/advisories/CA-2001-05.html http://www.ciac.org/ciac/bulletins/l-065.shtml http://www.securityfocus.com/bid/2417 https://exchange.xforce.ibmcloud.com/vulnerabilities/6245 •
CVE-2001-0165 – Solaris 7/8 - ximp40 Library Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0165
Buffer overflow in ximp40 shared library in Solaris 7 and Solaris 8 allows local users to gain privileges via a long "arg0" (process name) argument. • https://www.exploit-db.com/exploits/20603 http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html http://www.securityfocus.com/bid/2322 https://exchange.xforce.ibmcloud.com/vulnerabilities/6039 •
CVE-2001-0190
https://notcve.org/view.php?id=CVE-2001-0190
Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0). • http://marc.info/?l=bugtraq&m=97983943716311&w=2 http://marc.info/?l=bugtraq&m=98028642319440&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6224 •
CVE-2001-0115 – Solaris 7/8-beta - ARP Local Overflow
https://notcve.org/view.php?id=CVE-2001-0115
Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter. • https://www.exploit-db.com/exploits/250 http://marc.info/?l=bugtraq&m=97934312727101&w=2 http://marc.info/?l=bugtraq&m=97957435729702&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/200&type=0&nav=sec.sba http://www.securityfocus.com/bid/2193 https://exchange.xforce.ibmcloud.com/vulnerabilities/5928 •