Page 26 of 214 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers. • http://secunia.com/advisories/17334 http://securitytracker.com/id?1015112 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102016-1 http://www.securityfocus.com/bid/15222 http://www.vupen.com/english/advisories/2005/2226 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1445 https://owasp.org/www-community/attacks/Cross_Site_Tracing • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in the (1) Xsun and (2) Xprt commands in Solaris 7, 8, 9, and 10 allows local users to execute arbitrary code. • http://secunia.com/advisories/16955 http://secunia.com/advisories/17246 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101800-1 http://support.avaya.com/elmodocs2/security/ASA-2005-220.pdf http://www.osvdb.org/19699 http://www.osvdb.org/19700 https://exchange.xforce.ibmcloud.com/vulnerabilities/22410 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A943 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Unix File System (UFS) on Solaris 8 and 9, when logging is enabled, allows local users to cause a denial of service ("soft hang") via certain write operations to UFS. • http://secunia.com/advisories/16924 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101940-1 http://www.osvdb.org/19640 http://www.vupen.com/english/advisories/2005/1821 https://exchange.xforce.ibmcloud.com/vulnerabilities/22389 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 5

The runtime linker (ld.so) in Solaris 8, 9, and 10 trusts the LD_AUDIT environment variable in setuid or setgid programs, which allows local users to gain privileges by (1) modifying LD_AUDIT to reference malicious code and possibly (2) using a long value for LD_AUDIT. • https://www.exploit-db.com/exploits/1073 https://www.exploit-db.com/exploits/1074 http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034730.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034731.html http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034738.html http://secunia.com/advisories/15841 http://securitytracker.com/id?1014537 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101794-1 http://www.opensolaris.org/jive/thread • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerability in lpadmin on Sun Solaris 7, 8, and 9 allows local users to overwrite arbitrary files. • http://secunia.com/advisories/15723 http://securitytracker.com/id?1014218 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101768-1 http://www.securityfocus.com/bid/13968 •