Page 29 of 164 results (0.012 seconds)

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack. La implementación del protocolo TCP en Sun Solaris versiones 8, 9 y 10 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU excesivo y fin del tiempo de espera en las nuevas conexiones) mediante ataques de saturación de paquetes TCP SYN. • http://secunia.com/advisories/30125 http://secunia.com/advisories/30131 http://sunsolve.sun.com/search/document.do?assetkey=1-26-200864-1 http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm http://www.securityfocus.com/bid/29089 http://www.securitytracker.com/id?1019989 http://www.vupen.com/english/advisories/2008/1453/references http://www.vupen.com/english/advisories/2008/1585/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42264 • CWE-16: Configuration •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the floating point context switch implementation in Sun Solaris 9 and 10 on x86 platforms might allow local users to cause a denial of service (application exit), corrupt data, or trigger incorrect calculations via unknown vectors. Vulnerabilidad no especificada en la implementación de conmutación de contexto de punto flotante en Sun Solaris 9 y 10 en plataformas x86, podría permitir a usuarios locales provocar una denegación de servicio (salida de aplicación), corrupción de datos, o dispararía calculos incorrectos a través de vectores desconocidos. • http://secunia.com/advisories/29728 http://sunsolve.sun.com/search/document.do?assetkey=1-26-233921-1 http://www.securityfocus.com/bid/28733 http://www.securitytracker.com/id?1019833 http://www.vupen.com/english/advisories/2008/1193/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41765 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4950 • CWE-16: Configuration •

CVSS: 4.3EPSS: 10%CPEs: 2EXPL: 2

rpc.metad in Sun Solaris 10 allows remote attackers to cause a denial of service (daemon crash) via a malformed RPC request. rpc.metad de Sun Solaris 10 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una petición RPC malformada. • https://www.exploit-db.com/exploits/5258 http://secunia.com/advisories/29418 http://sunsolve.sun.com/search/document.do?assetkey=1-26-249146-1 http://support.avaya.com/elmodocs2/security/ASA-2009-015.htm http://www.securityfocus.com/bid/28261 http://www.securitytracker.com/id?1019652 http://www.vupen.com/english/advisories/2008/0918/references http://www.vupen.com/english/advisories/2009/0206 https://exchange.xforce.ibmcloud.com/vulnerabilities/41224 https://oval.cisecurity.org&#x •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors. Alguna imagen incorrecta de Sun Solaris 10 sobre servidores SPARC Enterprise T5120 y T5220 tiene los ficheros /etc/default/login y /etc/ssh/sshd_config que configuran los logins de root de una forma involuntaria por parte del fabricante, permite a atacantes remotos obtener privilegios a través de vectores desconocidos. • http://secunia.com/advisories/29529 http://sunsolve.sun.com/search/document.do?assetkey=1-66-231244-1 http://www.securityfocus.com/bid/28469 http://www.securitytracker.com/id?1019708 http://www.vupen.com/english/advisories/2008/0810/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41332 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

Unspecified vulnerability in the Internet Protocol (IP) implementation in Sun Solaris 8, 9, and 10 allows remote attackers to bypass intended firewall policies or cause a denial of service (panic) via unknown vectors, possibly related to ICMP packets and IP fragment reassembly. La vulnerabilidad no especificada en la implementación del Protocolo de Internet (IP) en Sun Solaris versiones 8, 9 y 10 permite a los atacantes remotos omitir las políticas de firewall previstas o causar una denegación de servicio (pánico) por medio de vectores desconocidos, posiblemente relacionados con los paquetes ICMP y el reensamblaje de fragmentos IP. • http://secunia.com/advisories/29100 http://secunia.com/advisories/29379 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200183-1 http://support.avaya.com/elmodocs2/security/ASA-2008-119.htm http://www.securityfocus.com/bid/27967 http://www.vupen.com/english/advisories/2008/0645 https://exchange.xforce.ibmcloud.com/vulnerabilities/40473 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5511 • CWE-264: Permissions, Privileges, and Access Controls •