Page 33 of 199 results (0.003 seconds)

CVSS: 5.0EPSS: 8%CPEs: 3EXPL: 0

Unknown vulnerability in Solaris 8 for Intel and Solaris 8 and 9 for SPARC allows remote attackers to cause a denial of service via certain packets that cause some network interfaces to stop responding to TCP traffic. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-48601-1 http://www.securityfocus.com/bid/6147 https://exchange.xforce.ibmcloud.com/vulnerabilities/10600 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The Web-Based Enterprise Management (WBEM) packages (1) SUNWwbdoc, (2) SUNWwbcou, (3) SUNWwbdev and (4) SUNWmgapp packages, when installed using Solaris 8 Update 1/01 or later, install files with world or group write permissions, which allows local users to gain root privileges or cause a denial of service. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-48320-1 http://www.ciac.org/ciac/bulletins/n-010.shtml http://www.securityfocus.com/bid/6061 https://exchange.xforce.ibmcloud.com/vulnerabilities/10495 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in Solaris 8, when the 0x02 bit (aka TEST, KMF_DEADBEEF, or deadbeef) is set in the kmem_flags kernel parameter, allows local users to cause a denial of service (system panic). • http://sunsolve.sun.com/search/document.do?assetkey=1-26-48067-1 http://www.securityfocus.com/bid/6080 https://exchange.xforce.ibmcloud.com/vulnerabilities/10496 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in NFS on Solaris 2.5.1 through Solaris 9 allows an NFS client to cause a denial of service by killing the lockd daemon. • http://marc.info/?l=bugtraq&m=103487058823193&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-47815-1 http://www.iss.net/security_center/static/10394.php http://www.kb.cert.org/vuls/id/855635 http://www.securityfocus.com/bid/5986 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •