Page 10 of 376 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: NFSv4). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via NFSv4 to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris. CVSS 3.0 Base Score 7.5 (Availability impacts). • http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.securityfocus.com/bid/99840 http://www.securitytracker.com/id/1038938 •

CVSS: 1.8EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data. • http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.securityfocus.com/bid/99852 http://www.securitytracker.com/id/1038938 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). • https://www.exploit-db.com/exploits/45625 https://www.exploit-db.com/exploits/42270 http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html http://www.securityfocus.com/bid/99150 https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/solaris/local/rsh_stack_clash_priv_esc.rb • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 3

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). • https://www.exploit-db.com/exploits/45625 https://www.exploit-db.com/exploits/42270 http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html http://www.securityfocus.com/bid/99153 https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/solaris/local/rsh_stack_clash_priv_esc.rb • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Common Desktop Environment (CDE)). The supported version that is affected is 10. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. Note: CVE-2017-3622 is assigned for the "Extremeparr". • https://www.exploit-db.com/exploits/45479 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97774 http://www.securitytracker.com/id/1038292 https://github.com/HackerFantastic/Public/blob/master/exploits/dtappgather-poc.sh https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/solaris/local/extremeparr_dtappgather_priv_esc.rb •