Page 31 of 364 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 16EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the Gateway component in Sun Java System Portal Server 6.3.1, 7.1, and 7.2 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados(XSS) en el componente Gateway en Sun Java System Portal Server v6.3.1, v7.1, y v7.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria. • http://securitytracker.com/id?1023260 http://sunsolve.sun.com/search/document.do?assetkey=1-21-138686-04-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-269368-1 http://www.securityfocus.com/bid/37186 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 1%CPEs: 52EXPL: 0

Unspecified vulnerability in the timeout mechanism in sshd in Sun Solaris 10, and OpenSolaris snv_99 through snv_123, allows remote attackers to cause a denial of service (daemon outage) via unknown vectors that trigger a "dangling sshd authentication thread." Vulnerabilidad inespecífica en el mecanismo de tiempo limite en sshd en Sun Solaris v10, y OpenSolaris desde snv_99 hasta snv_123, permite a atacantes remotos producir una denegación de servicio (agotamiento de demonio) a través de vectores desconocidos que inician un "hilo de proceso de autenticación oscilante". • http://osvdb.org/60498 http://sunsolve.sun.com/search/document.do?assetkey=1-21-143140-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-272629-1 http://www.securityfocus.com/bid/37116 http://www.vupen.com/english/advisories/2009/3333 https://exchange.xforce.ibmcloud.com/vulnerabilities/54401 •

CVSS: 7.8EPSS: 2%CPEs: 78EXPL: 0

Memory leak in the Sockets Direct Protocol (SDP) driver in Sun Solaris 10, and OpenSolaris snv_57 through snv_94, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors. Fallo de memoria en el controlador de Sockets Direct Protocol (SDP) en Sun Solaris v10, y OpenSolaris snv_57 hasta snv_94, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) mediante vectores no especificados. • http://securitytracker.com/id?1023124 http://sunsolve.sun.com/search/document.do?assetkey=1-21-141444-09-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-264730-1 http://www.securityfocus.com/bid/36904 http://www.vupen.com/english/advisories/2009/3130 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6563 • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Trusted Extensions in Sun Solaris 10 interferes with the operation of the xscreensaver-demo command for the XScreenSaver application, which makes it easier for physically proximate attackers to access an unattended workstation for which the intended screen locking did not occur, related to the "restart daemon." Trusted Extensions en Sun Solaris 10 interfiere con la operación del comando xscreensaver-demo para la aplicación XScreenSaver, lo que facilita a atacantes próximos físicamente acceder a una estación desatendida en la que el bloqueo de pantalla no ha sido efectivo. Relacionado con "restart daemon (reinicio del demonio)". • http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-28-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270809-1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6845 •

CVSS: 6.8EPSS: 4%CPEs: 181EXPL: 0

Unspecified vulnerability in the Solaris Trusted Extensions Policy configuration in Sun Solaris 10, and OpenSolaris snv_37 through snv_125, might allow remote attackers to execute arbitrary code by leveraging access to the X server. Vulnerabilidad sin especificar en la configuración de Solaris Trusted Extensions Policy en Sun Solaris 10 y Opensolaris snv_37 a la snv_125, podría permitir a atacantes remotos ejecutar código de su elección aprovechando el acceso al sevidor X. • http://secunia.com/advisories/37184 http://sunsolve.sun.com/search/document.do?assetkey=1-66-270969-1 http://www.securityfocus.com/bid/36840 http://www.vupen.com/english/advisories/2009/3070 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6480 •