Page 20 of 199 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

The Solaris Management Console (SMC) GUI for Solaris 8 and 9, when creating user accounts that are configured for password aging, creates the accounts with a blank password, which allows remote or local attackers to break into those accounts. • http://secunia.com/advisories/13803 http://securitytracker.com/id?1012860 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57717-1 http://www.ciac.org/ciac/bulletins/p-096.shtml http://www.securityfocus.com/bid/12260 https://exchange.xforce.ibmcloud.com/vulnerabilities/18868 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

Directory traversal vulnerability in the vfs_getvfssw function in Solaris 2.6, 7, 8, and 9 allows local users to load arbitrary kernel modules via crafted (1) mount or (2) sysfs system calls. NOTE: this might be the same issue as CVE-2004-1767, but there are insufficient details to be sure. • https://www.exploit-db.com/exploits/23874 http://seclists.org/bugtraq/2004/Apr/0081.html http://securitytracker.com/id?1008833 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2004-04/0297.html http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf http://www.securityfocus.com/bid/9962 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1381 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

The kernel in Solaris 2.6, 7, 8, and 9 allows local users to gain privileges by loading arbitrary loadable kernel modules (LKM), possibly involving the modload function. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57479-1 http://www.kb.cert.org/vuls/id/702526 http://www.securityfocus.com/bid/9477 https://exchange.xforce.ibmcloud.com/vulnerabilities/14917 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4532 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in uustat in Sun Solaris 8 and 9 allows local users to execute arbitrary code via a long -S command line argument. • http://secunia.com/advisories/18371 http://secunia.com/advisories/19087 http://securitytracker.com/id?1015455 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101933-1 http://support.avaya.com/elmodocs2/security/ASA-2006-056.htm http://www.idefense.com/intelligence/vulnerabilities/display.php?id=366 http://www.securityfocus.com/bid/16193 http://www.vupen.com/english/advisories/2006/0113 https://exchange.xforce.ibmcloud.com/vulnerabilities/24045 •

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

Sun Solaris 7 through 9, when Basic Security Module (BSM) is enabled and the SUNWscpu package has been removed as a result of security hardening, disables mail alerts from the audit_warn script, which might allow attackers to escape detection. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57483-1 http://www.ciac.org/ciac/bulletins/o-070.shtml http://www.securityfocus.com/bid/13724 https://exchange.xforce.ibmcloud.com/vulnerabilities/15042 •