CVE-2008-1779
https://notcve.org/view.php?id=CVE-2008-1779
Sun Solaris 8, 9, and 10 allows "remote privileged" users to cause a denial of service (panic) via unknown vectors related to self encapsulated IP packets. Sun Solaris 8, 9 y 10 permite usuarios con "privilegios remotos" provocar una denegación de servicio (pánico), mediante vectores desconocidos relacionados con los paquetes IP autoencapsulados. • http://secunia.com/advisories/29783 http://secunia.com/advisories/29817 http://sunsolve.sun.com/search/document.do?assetkey=1-26-235901-1 http://support.avaya.com/elmodocs2/security/ASA-2008-173.htm http://www.securityfocus.com/bid/28732 http://www.securitytracker.com/id?1019831 http://www.vupen.com/english/advisories/2008/1192/references http://www.vupen.com/english/advisories/2008/1325/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41762 https://oval.cisecurity.org • CWE-399: Resource Management Errors •
CVE-2008-1780
https://notcve.org/view.php?id=CVE-2008-1780
Unspecified vulnerability in the labeled networking functionality in Solaris 10 Trusted Extensions allows applications in separate labeling zones to bypass labeling restrictions via unknown vectors. Vulnerabilidad no especificada en la funcionalidad etiquetada de trabajo en red de Solaris 10 Trusted Extensions permite a aplicaciones en zonas etiquetadas separadas evitar las restricciones de etiquetas a través de vectores desconocidos. • http://secunia.com/advisories/29730 http://sunsolve.sun.com/search/document.do?assetkey=1-26-235421-1 http://www.securityfocus.com/bid/28734 http://www.securitytracker.com/id?1019832 http://www.vupen.com/english/advisories/2008/1194/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41764 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-1684
https://notcve.org/view.php?id=CVE-2008-1684
inetd on Sun Solaris 10, when debug logging is enabled, allows local users to write to arbitrary files via a symlink attack on the /var/tmp/inetd.log temporary file. inetd en Sun Solaris 10, cuando está habilitado la validación de depuración, permite a usuarios locales escribir en archivos de su elección a través de un ataque de enlaces simbólicos en el fichero temporal /var/tmp/inetd.log. • http://secunia.com/advisories/29654 http://securitytracker.com/id?1019781 http://sunsolve.sun.com/search/document.do?assetkey=1-26-233284-1 http://www.securityfocus.com/bid/28584 http://www.vupen.com/english/advisories/2008/1076 https://exchange.xforce.ibmcloud.com/vulnerabilities/41626 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5369 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2008-0709
https://notcve.org/view.php?id=CVE-2008-0709
Multiple unspecified vulnerabilities in HP Select Identity 4.00, 4.01, 4.11, 4.12, 4.13, and 4.20 allow remote authenticated users to access other user accounts via unknown vectors, a different issue than CVE-2008-0214. Múltiples vulnerabilidades no especificadas en HP Select Identity 4.00, 4.01, 4.11, 4.12, 4.13 y 4.20 permiten a usuarios remotos autenticados acceder a otras cuentas de usuario a través de vectores no conocidos, un problema diferente al de la CVE-2008-0214 • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01391833 http://secunia.com/advisories/29643 http://securitytracker.com/id?1019746 http://www.securityfocus.com/bid/28558 http://www.vupen.com/english/advisories/2008/1072/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41583 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-1480 – SunOS 5.10 Sun Cluster - 'rpc.metad' Denial of Service (PoC)
https://notcve.org/view.php?id=CVE-2008-1480
rpc.metad in Sun Solaris 10 allows remote attackers to cause a denial of service (daemon crash) via a malformed RPC request. rpc.metad de Sun Solaris 10 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una petición RPC malformada. • https://www.exploit-db.com/exploits/5258 http://secunia.com/advisories/29418 http://sunsolve.sun.com/search/document.do?assetkey=1-26-249146-1 http://support.avaya.com/elmodocs2/security/ASA-2009-015.htm http://www.securityfocus.com/bid/28261 http://www.securitytracker.com/id?1019652 http://www.vupen.com/english/advisories/2008/0918/references http://www.vupen.com/english/advisories/2009/0206 https://exchange.xforce.ibmcloud.com/vulnerabilities/41224 https://oval.cisecurity.org •