Page 11 of 391 results (0.006 seconds)

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack. La implementación del protocolo TCP en Sun Solaris versiones 8, 9 y 10 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU excesivo y fin del tiempo de espera en las nuevas conexiones) mediante ataques de saturación de paquetes TCP SYN. • http://secunia.com/advisories/30125 http://secunia.com/advisories/30131 http://sunsolve.sun.com/search/document.do?assetkey=1-26-200864-1 http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm http://www.securityfocus.com/bid/29089 http://www.securitytracker.com/id?1019989 http://www.vupen.com/english/advisories/2008/1453/references http://www.vupen.com/english/advisories/2008/1585/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42264 • CWE-16: Configuration •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly. La vulnerabilidad no especificada en la implementación del Protocolo de Internet (IP) en Sun Solaris versiones 8, 9 y 10 permite a los atacantes remotos omitir las políticas de firewall previstas o causar una denegación de servicio (pánico) por medio de vectores desconocidos, posiblemente relacionados con los paquetes ICMP y el reensamblaje de fragmentos IP. • http://secunia.com/advisories/29100 http://secunia.com/advisories/29379 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200183-1 http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm http://www.securityfocus.com/bid/27967 http://www.vupen.com/english/advisories/2008/0645 https://exchange.xforce.ibmcloud.com/vulnerabilities/40473 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5511 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.4EPSS: 6%CPEs: 11EXPL: 0

The Oracle database component in Sun Management Center (Sun MC) 3.6.1, 3.6, and 3.5 Update 1 has a default account, which allows remote attackers to obtain database access and execute arbitrary code. El componente de base de datos Oracle en Sun Management Center (Sun MC) 3.6.1, 3.6, y 3.5 Update 1 tiene un cuenta por defecto, que permite a atacantes remotos obtener acceso a la base de datos y ejecutar código de su elección. • http://osvdb.org/39563 http://secunia.com/advisories/28151 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103152-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201508-1 http://www.securityfocus.com/bid/26948 http://www.securitytracker.com/id?1019119 http://www.vupen.com/english/advisories/2007/4268 https://exchange.xforce.ibmcloud.com/vulnerabilities/39137 •

CVSS: 7.8EPSS: 5%CPEs: 13EXPL: 0

Unspecified vulnerability in the Device Manager daemon (utdevmgrd) in Sun Ray Server Software 2.0, 3.0, 3.1, and 3.1.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors. Vulnerabilidad no especificada en el demonio Device Manager (utdevmgrd) en Sun Ray Server Software 2.0, 3.0, 3.1, y 3.1.1 permite a atacantes remotos provocar denegación de servicio (caida de demonio) a través de vectores no especificados. • http://osvdb.org/40846 http://secunia.com/advisories/28148 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103175-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201227-1 http://www.securityfocus.com/bid/26944 http://www.securitytracker.com/id?1019118 http://www.vupen.com/english/advisories/2007/4269 https://exchange.xforce.ibmcloud.com/vulnerabilities/39133 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in srsexec in Sun Remote Services (SRS) Net Connect 3.2.3 and 3.2.4, as distributed in the SRS Proxy Core (SUNWsrspx) package, allows local users to gain privileges via format string specifiers in unspecified input that is logged through syslog. Vulnerabilidad de formato de cadena en Sun Remote Services (SRS) Net Connect 3.2.3 y 3.2.4, como distribución en el paquete SRS Proxy Core (SUNWsrspx),permite a usuarios locales ganar privilegios a través de especificaciones de formato de cadena en entradas no especificadas que se validan a través del syslog. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=610 http://osvdb.org/40836 http://secunia.com/advisories/27512 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103119-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200581-1 http://www.securityfocus.com/bid/26313 http://www.securitytracker.com/id?1018893 http://www.vupen.com/english/advisories/2007/3711 • CWE-134: Use of Externally-Controlled Format String •