Page 37 of 229 results (0.005 seconds)

CVSS: 7.8EPSS: 8%CPEs: 1EXPL: 0

Sun Solaris 10 before patch 118855-16 (20060925), when run on x64 systems using IPv6, allows remote attackers to cause a denial of service (kernel panic) via crafted IPv6 packets. Sun Solaris 10 anterior al parche 118855-16 (25/09/2006), cuando se ejecuta sober sistemas x64 usando IPv6 permite a un atacante remoto provocar denegación de servicio (kernel panic) a través de paquetes artesanales IPv6. • http://secunia.com/advisories/22103 http://securitytracker.com/id?1016930 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102568-1 http://support.avaya.com/elmodocs2/security/ASA-2006-235.htm http://www.securityfocus.com/bid/20195 http://www.vupen.com/english/advisories/2006/3767 https://exchange.xforce.ibmcloud.com/vulnerabilities/29150 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1893 •

CVSS: 6.6EPSS: 0%CPEs: 14EXPL: 0

Unspecified vulnerability in Sun Solaris 8, 9, and 10 before 20060925 allows local users to cause a denial of service (disable syslog) and prevent security messages from being logged via unspecified vectors. Vulnerabilidad no especificada en Sun Solaris 8, 9, y 10 anteiror a 25/09/2006, permite a un usuario local provocar una denegación de servicio (deshabilitar el registro del sistema) y evitar que los mensajes de la seguridad sean registrados a trvavés de vectores sin especificar. • http://secunia.com/advisories/22083 http://secunia.com/advisories/22587 http://securitytracker.com/id?1016929 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102510-1 http://support.avaya.com/elmodocs2/security/ASA-2006-235.htm http://www.securityfocus.com/bid/20211 http://www.vupen.com/english/advisories/2006/3768 https://exchange.xforce.ibmcloud.com/vulnerabilities/29149 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 4

Buffer overflow in the Strcmp function in the XKEYBOARD extension in X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment variable value. Desbordamiento de búfer en función Strcmp en la extensión XKEYBOARD en Window System X11R6.4 y anteriores, según lo utilizado en SCO UnixWare 7.1.3 y Sun Solaris 8 hasta la 10, permite a un usuario local subir privilegios a través del valor de la larga variable de entorno _XKB_CHARSET. • https://www.exploit-db.com/exploits/2332 https://www.exploit-db.com/exploits/2331 https://www.exploit-db.com/exploits/2330 https://www.exploit-db.com/exploits/2360 http://secunia.com/advisories/21815 http://secunia.com/advisories/21845 http://secunia.com/advisories/21856 http://secunia.com/advisories/21993 http://securityreason.com/securityalert/1545 http://securitytracker.com/id?1016806 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102570-1 http://support. •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

Buffer overflow in the format command in Solaris 8, 9, and 10 allows local users with access to format (such as the "File System Management" RBAC profile) to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2006-4307. Desbordamiento de búfer en el comando format en Solaris 8, 9, y 10 permite a usuarios locales con acceso a format (tales y como el perfil RBAC "File System Management") ejecutar código de su elección a través de vectores desconocidos, una vulnerabilidad distinta de CVE-2006-4307. • http://secunia.com/advisories/21581 http://secunia.com/advisories/22295 http://securitytracker.com/id?1016727 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102519-1 http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm http://www.securityfocus.com/bid/19657 http://www.vupen.com/english/advisories/2006/3355 https://exchange.xforce.ibmcloud.com/vulnerabilities/28519 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2164 •

CVSS: 2.6EPSS: 3%CPEs: 1EXPL: 0

Race condition in (1) libnsl and (2) TLI/XTI API routines in Sun Solaris 10 allows remote attackers to cause a denial of service ("tight loop" and CPU consumption for listener applications) via unknown vectors related to TCP fusion (do_tcp_fusion). Condición de carrera en rutinas de API (1) libnsl y (2) TLW/XTI en Sun Solaris 10 permite a atacantes remotos provocar una denegación de servicio (bucle cerrado y agotamiento de CPU para aplicaciones a la escucha) a través de vectores desconocidos relacionados con la fusión TCP (do_tcp_fusion). • http://securitytracker.com/id?1016706 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102576-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/28420 •