Page 2 of 8 results (0.005 seconds)

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors. Alguna imagen incorrecta de Sun Solaris 10 sobre servidores SPARC Enterprise T5120 y T5220 tiene los ficheros /etc/default/login y /etc/ssh/sshd_config que configuran los logins de root de una forma involuntaria por parte del fabricante, permite a atacantes remotos obtener privilegios a través de vectores desconocidos. • http://secunia.com/advisories/29529 http://sunsolve.sun.com/search/document.do?assetkey=1-66-231244-1 http://www.securityfocus.com/bid/28469 http://www.securitytracker.com/id?1019708 http://www.vupen.com/english/advisories/2008/0810/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41332 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 6%CPEs: 5EXPL: 0

Unspecified vulnerability in the Sun eXtended System Control Facility (XSCF) Control Package (XCP) firmware before 1050 on SPARC Enterprise M4000, M5000, M8000, and M9000 servers allows remote attackers to cause a denial of service (reboot) via (1) telnet, (2) ssh, or (3) http network traffic that triggers memory exhaustion. Vulnerabilidad no especificada en Sun eXtended System Control Facility (XSCF) Control Package (XCP) versiones anteriores de firmware a 1050 de servidores SPARC Enterprise M4000, M5000, M8000, y M9000 permite a atacantes remotos provocar una denegación de servicio (reinicio) mediante tráfico de red (1) telnet, (2) ssh, ó (3) http que dispara agotamiento de memoria. • http://osvdb.org/40842 http://osvdb.org/40843 http://osvdb.org/40844 http://secunia.com/advisories/27926 http://securitytracker.com/id?1019048 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103159-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201333-1 http://www.securityfocus.com/bid/26712 http://www.vupen.com/english/advisories/2007/4098 https://exchange.xforce.ibmcloud.com/vulnerabilities/38860 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN. • https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml •