Page 21 of 391 results (0.008 seconds)

CVSS: 5.0EPSS: 96%CPEs: 14EXPL: 3

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. • https://www.exploit-db.com/exploits/948 https://www.exploit-db.com/exploits/25389 https://www.exploit-db.com/exploits/942 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt http://marc.info/?l=bugtraq&m=112861397904255&w=2 http://secunia.com/advisories/18317 http://secunia.com/advisories/22341 http://securityreason.com/securityalert/19 http://securityreason.com/securityalert/57 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1 htt •

CVSS: 5.0EPSS: 60%CPEs: 4EXPL: 1

Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. • https://www.exploit-db.com/exploits/25387 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt http://marc.info/?l=bugtraq&m=112861397904255&w=2 http://secunia.com/advisories/18317 http://securityreason.com/securityalert/19 http://securityreason.com/securityalert/57 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1 http://www.gont.com.ar/drafts/icmp-attacks-against-tcp. •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in newgrp in Solaris 7 through 9 allows local users to gain root privileges. • http://securitytracker.com/id?1013462 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57710-1 http://www.securityfocus.com/bid/12838 https://exchange.xforce.ibmcloud.com/vulnerabilities/19729 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The logging feature in kcms_configure in the KCMS package on Solaris 8 and 9, and possibly other versions, allows local users to corrupt arbitrary files via a symlink attack on the KCS_ClogFile file. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57706-1 http://www.idefense.com/application/poi/display?id=206&type=vulnerabilities •

CVSS: 5.0EPSS: 6%CPEs: 2EXPL: 0

Unknown vulnerability in Solaris 8 and 9 allows remote attackers to cause a denial of service (panic) via "Heavy UDP Usage" that triggers a NULL dereference. Vulnerabilidad desconocida en Solaris 8 y 9 permite a atacantes remotos provocar la Denegación de Servicio (DoS) mediante ""Heavy UDP Usage"" que lanza una referencia a NULL. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-57728-1 http://www.securityfocus.com/bid/12385 https://exchange.xforce.ibmcloud.com/vulnerabilities/19119 •