CVE-2010-0091 – OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703)
https://notcve.org/view.php?id=CVE-2010-0091
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2010-0084. Vulnerabilidad no especificada en el componente Java Runtime Environment en Oracle Java SE y Java for Business 6 Update 18, 5.0 Update 23 y 1.4.2_25 permite a atacantes remotos afectar la confidencialidad a través de vectores desconocidos, una vulnerabilidad diferente a CVE-2010-0084. • http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 http://lists.apple.com/archives/security-announce/2010//May/msg00001.html http://lists.apple.com/archives/security-announce/2010//May/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html http://marc.info/?l=bugtraq&m=127557596201693&w=2 •
CVE-2010-1183 – Solaris Recommended Patch Cluster 6/19 (x86) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2010-1183
Certain patch-installation scripts in Oracle Solaris allow local users to append data to arbitrary files via a symlink attack on the /tmp/CLEANUP temporary file, related to use of Update Manager. Algunos scripts de instalación de parches de Oracle Solaris permiten a los usuarios locales añadir datos a ficheros de su elección a través de un ataque symlink (de enlace simbólico) al fichero temporal /tmp/CLEANUP. Información relacionada con el "Update Manager" (gestor de actualizaciones). Solaris Recommended Patch Cluster 6/19 suffers from a local root command execution vulnerability on x86. • https://www.exploit-db.com/exploits/26709 https://www.exploit-db.com/exploits/20418 https://www.exploit-db.com/exploits/33799 http://www.securityfocus.com/archive/1/510305/100/0/threaded http://www.securityfocus.com/archive/1/510311/100/0/threaded http://www.securityfocus.com/bid/38928 https://exchange.xforce.ibmcloud.com/vulnerabilities/57149 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2003-1589
https://notcve.org/view.php?id=CVE-2003-1589
Unspecified vulnerability in Sun ONE (aka iPlanet) Web Server 4.1 before SP13 and 6.0 before SP6 on Windows allows attackers to cause a denial of service (daemon crash) via unknown vectors. Vulnerabilidad sin especificar en Sun ONE (aka iPlanet) Web Server v4.1 anteriores a SP13 y v6.0 anteriores SP6 sobre Windows permite a atacantes producir una denegación de servicio (caída de demonio) a través de vectores desconocidos. • http://sunsolve.sun.com/search/document.do?assetkey=1-66-201454-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/56616 •
CVE-2003-1590
https://notcve.org/view.php?id=CVE-2003-1590
Unspecified vulnerability in Sun ONE (aka iPlanet) Web Server 6.0 SP3 through SP5 on Windows allows remote attackers to cause a denial of service (daemon crash) via unknown vectors. Vulnerabilidad sin especificar en Sun ONE (también conocido como iPlanet) Web Server v6.0 SP3 a SP5 sobre Windows, permite a atacantes remotos provocar una denegación de servicio (caída de demonio) a través de vectores desconocidos. • http://sunsolve.sun.com/search/document.do?assetkey=1-66-201451-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/56615 •
CVE-2010-0708
https://notcve.org/view.php?id=CVE-2010-0708
Multiple unspecified vulnerabilities in (1) ns-slapd and (2) slapd.exe in Sun Directory Server Enterprise Edition 7.0, Sun Java System Directory Server 5.2, and Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 allow remote attackers to cause a denial of service (daemon crash) via a crafted LDAP search request. Múltiples vulnerabilidades sin especificar en (1) ns-slapd y (2) slapd.exe en Sun Directory Server Enterprise Edition v7.0, Sun Java System Directory Server v5.2, y Sun Java System Directory Server Enterprise Edition v6.0 a la v6.3.1, permite a atacantes remotos provocar una denegación de servicio (caída de demonio) a través de una petición de búsqueda manipulada en el LDAP. • http://sunsolve.sun.com/search/document.do?assetkey=1-21-143884-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-275711-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021788.1-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/56603 •