Page 25 of 391 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

Unknown vulnerability in the Basic Security Module (BSM), when configured to audit either the Administrative (ad) or the System-Wide Administration (as) audit class in Solaris 7, 8, and 9, allows local users to cause a denial of service (kernel panic). Vulnerabilidad desconocida en el Basic Security Module (BSM), cuando se configura para auditar las clases Administrativa (ad) o de todo el sistema (as) en Solaris 7,8 y 9, permite a usuarios locales causar una denegación de servicio (caída del kenel). • http://secunia.com/advisories/11930 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57497 http://www.kb.cert.org/vuls/id/901582 http://www.securityfocus.com/bid/10594 https://exchange.xforce.ibmcloud.com/vulnerabilities/16483 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2426 •

CVSS: 7.2EPSS: 0%CPEs: 18EXPL: 0

Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool. Multiples vulnerabilidades desconocidas en el kernel 2.6 de Linux permite a usuarios locales ganar privilegios o acceder a memoria del kernel, un grupo de vulerabilidades distinto de los identificado por CAN-2004-0495, como se ha encontrado con la herramienta de comprobación de código fuente Sparse • http://www.novell.com/linux/security/advisories/2004_20_kernel.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16625 •

CVSS: 10.0EPSS: 26%CPEs: 31EXPL: 0

Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root. Múltiples desbordamientos de búfer en krb5_aname_to_localname en MIT Kerberos 5 (krb5) 1.3.3 y anteriores permite a atacantes remtos ejecutar código de su elección como root • ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 http://lwn.net/Articles/88206 http://marc.info/?l=bugtraq&m=108612325909496&w=2 http://marc.info/?l=bugtraq&m=108619161815320&w=2 http://marc.info/?l=bugtraq&m=108619250923790&w=2 http://sunsolve.sun.com/search/document.do? •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

The Solaris Management Console (SMC) in Sun Solaris 8 and 9 generates different 404 error messages when a file does not exist versus when a file exists but is otherwise inaccessible, which could allow remote attackers to obtain sensitive information in conjunction with a directory traversal (..) attack. • http://secunia.com/advisories/11616 http://spoofed.org/files/text/solaris-smc-advisory.txt http://sunsolve.sun.com/search/document.do?assetkey=1-26-57559-1&searchclause=%22category:security%22%20%20111313-02 http://www.auscert.org.au/render.html?it=4105 http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-sun/2003-10/0032.html http://www.osvdb.org/displayvuln.php?osvdb_id=6119 http://www.securityfocus.com/bid/10349 http://www.securityfocus.com/bid/8873 https://exchange& • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the sendfilev function in Sun Solaris 8 and 9 allows local users to cause a denial of service (system panic) via unknown vectors. • http://secunia.com/advisories/11457 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57470-1&searchclause=%22category:security%22%20%20108528-27 http://www.auscert.org.au/render.html?it=4056 http://www.osvdb.org/displayvuln.php?osvdb_id=5619 http://www.securityfocus.com/bid/10202 https://exchange.xforce.ibmcloud.com/vulnerabilities/15946 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1684 •