Page 32 of 229 results (0.006 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in inetd in Sun Solaris 10 before 20070529 allows local users to cause a denial of service (daemon termination) via unspecified manipulations of the /var/run/.inetd.uds Unix domain socket file. Vulnerabilidad no especificada en inetd de Sun Solaris 10 versiones anteriores a 20070529 permite a usuarios locales provocar una denegación de servicio (terminación de demonio) mediante manipulaciones no especificadas del fichero de socket de dominio Unix var/run/.inetd.uds. • http://osvdb.org/36585 http://secunia.com/advisories/25450 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102921-1 http://www.securityfocus.com/bid/24213 http://www.securitytracker.com/id?1018133 http://www.vupen.com/english/advisories/2007/1984 https://exchange.xforce.ibmcloud.com/vulnerabilities/34577 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2032 •

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 1

Unspecified vulnerability in the NFS client module in Sun Solaris 8 through 10 before 20070524, when operating as an NFS server, allows remote attackers to cause a denial of service (crash) via certain Access Control List (acl) packets. Vulnerabilidad no especificada en el módulo cliente NFS de Sun Solaris 8 hasta 10 anterior al 24/05/2007, cuando opera como un servidor NFS, permite a atacantes remotos provocar una denegación de servicio (caída) mediante determinados paquetes de Lista de Control de Acceso (Access Control List o acl). • http://osvdb.org/34908 http://secunia.com/advisories/25403 http://secunia.com/advisories/25879 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102911-1 http://support.avaya.com/elmodocs2/security/ASA-2007-245.htm http://www.securityfocus.com/bid/24145 http://www.securitytracker.com/id?1018129 http://www.vupen.com/english/advisories/2007/1943 https://exchange.xforce.ibmcloud.com/vulnerabilities/34504 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 1

srsexec in Sun Remote Services (SRS) Net Connect Software Proxy Core package in Sun Solaris 10 does not enforce file permissions when opening files, which allows local users to read the first line of arbitrary files via the -d and -v options. srsexec en el paquete Sun Remote Services (SRS) Net Connect Software Proxy Core en Sun Solaris 10 no hace cumplir los permisos de ficheros al abrirlos, lo cual permite a usuarios locales leer la primera línea de ficheros de su elección mediante las opciones -d y -v. • https://www.exploit-db.com/exploits/30021 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=531 http://osvdb.org/35940 http://secunia.com/advisories/25194 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102891-1 http://www.securityfocus.com/bid/23915 http://www.securitytracker.com/id?1018046 http://www.vupen.com/english/advisories/2007/1769 https://exchange.xforce.ibmcloud.com/vulnerabilities/34223 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Integer signedness error in the acl (facl) system call in Solaris 10 before 20070507 allows local users to cause a denial of service (kernel panic) and possibly gain privileges via a certain argument, related to ACE_SETACL. Error de entero sin signo en la llamada al sistema acl (facl) en Solaris 10 anterior al 07/05/2007 permite a atacantes remotos provocar una denegación de servicio (error irrecuperable en el núcleo del sistema, kernel panic) y posiblemente obtener privilegios mediante un cierto argumento, relacionado con ACE_SETACL. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=524 http://osvdb.org/34906 http://secunia.com/advisories/25162 http://securitytracker.com/id?1018009 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102869-1 http://www.securityfocus.com/bid/23863 http://www.vupen.com/english/advisories/2007/1683 https://exchange.xforce.ibmcloud.com/vulnerabilities/34147 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1669 •

CVSS: 7.5EPSS: 8%CPEs: 10EXPL: 0

Format string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog. Vulnerabilidad de formato de cadena en libwebconsole_services.so de Sun Java Web Console 2.2.2 hasta 2.2.5 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación), obtener información confidencial, y posiblemente ejecutar código de su elección mediante vectores no especificados durante un intento fallido de autenticación en el sistema, referido a syslog. • http://osvdb.org/34902 http://secunia.com/advisories/24927 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1 http://www.nruns.com/security_advisory_sun_java_format_string.php http://www.securityfocus.com/archive/1/466048/100/0/threaded http://www.securityfocus.com/bid/23539 http://www.securitytracker.com/id?1017930 http://www.vupen.com/english/advisories/2007/1443 https://exchange.xforce.ibmcloud.com/vulnerabilities/33731 https://oval.cisecurity.org/repository/ •