Page 130 of 1722 results (0.014 seconds)

CVSS: 6.8EPSS: 4%CPEs: 181EXPL: 0

Unspecified vulnerability in the Solaris Trusted Extensions Policy configuration in Sun Solaris 10, and OpenSolaris snv_37 through snv_125, might allow remote attackers to execute arbitrary code by leveraging access to the X server. Vulnerabilidad sin especificar en la configuración de Solaris Trusted Extensions Policy en Sun Solaris 10 y Opensolaris snv_37 a la snv_125, podría permitir a atacantes remotos ejecutar código de su elección aprovechando el acceso al sevidor X. • http://secunia.com/advisories/37184 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270969-1 http://www.securityfocus.com/bid/36840 http://www.vupen.com/english/advisories/2009/3070 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6480 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. packet-paltalk.c en el analizador Paltalk en Wireshark desde v1.2.0 hasta v1.2.2, en SPARC y algunas otras plataformas, permite a atacantes remotos producir una denegación de servicio (caída de aplicación) a través de un fichero que almacena la ruta de un paquete manipulado. • http://secunia.com/advisories/37175 http://secunia.com/advisories/37409 http://www.securityfocus.com/bid/36846 http://www.vupen.com/english/advisories/2009/3061 http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html http://www.wireshark.org/security/wnpa-sec-2009-07.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3689 https://exchange.xforce.ibmcloud.com/vulnerabilities/54016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6391 • CWE-20: Improper Input Validation •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

XScreenSaver in Sun Solaris 10, when the accessibility feature is enabled, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, a different vulnerability than CVE-2009-1276 and CVE-2009-2711. XScreenSaver de Sun Solaris 10, cuando la característica de accesibilidad está habilitada, permite a atacantes cercanos físicamente obtener información sensible leyendo las ventanas emergentes que se muestran incluso con el monitor bloqueado. Se trata de una vulnerabilidad diferente de CVE-2009-1276 y CVE-2009-2711. • http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-29-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-268288-1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6644 • CWE-16: Configuration •

CVSS: 4.4EPSS: 0%CPEs: 39EXPL: 0

Unspecified vulnerability in the ZFS filesystem in Sun Solaris 10, and OpenSolaris snv_100 through snv_117, allows local users to bypass intended limitations of the file_chown_self privilege via certain uses of the chown system call. Vulnerabilidad no especificada en el sistema de archivos ZFS en Sun Solaris 10 y OpenSolaris snv_100 hasta snv_117, permite a usuarios locales eludir las limitaciones de permisos de file_chown_self a través de determinados usos de la llamada al sistema chown. • http://secunia.com/advisories/37010 http://sunsolve.sun.com/search/document.do?assetkey=1-21-141444-09-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-265908-1 http://www.securityfocus.com/bid/36702 http://www.vupen.com/english/advisories/2009/2917 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 1

Unspecified vulnerability in the VBoxNetAdpCtl configuration tool in Sun VirtualBox 3.0.x before 3.0.8 on Solaris x86, Linux, and Mac OS X allows local users to gain privileges via unknown vectors. Vulnerabilidad no especificada en la herramienta de configuración VBoxNetAdpCtl en Sun VirtualBox v3.0.x anterior v3.0.8 en Solaris x86, Linux, y Mac OS X permite a usuarios locales obtener privilegios a través de vectores desconocidos. • https://www.exploit-db.com/exploits/9973 http://secunia.com/advisories/36929 http://securitytracker.com/id?1022990 http://sunsolve.sun.com/search/document.do?assetkey=1-66-268188-1 http://www.osvdb.org/58652 http://www.securityfocus.com/bid/36604 http://www.virtualbox.org/wiki/Changelog http://www.vupen.com/english/advisories/2009/2845 https://exchange.xforce.ibmcloud.com/vulnerabilities/53671 •