Page 42 of 238 results (0.018 seconds)

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the kernel in Solaris 10 with patch 118822-29 (118844-29 on x86) and without patch 118833-11 (118855-08) allows remote authenticated users to cause a denial of service via unspecified vectors that lead to "kernel data structure corruption" that can trigger a system panic, application failure, or "data corruption." Vulnerabilidad no especificada en el Kernel en Solaris 10 con 118822-29 (118844-29 sobre x86) y sin el parche 118833-11 (118855-08) permite a usuarios remotos validados provocar denegación de servicios a través de vectores no especificados que llevan a "corrupción de la estructura de datos del kernel" que puede disparar panico del sistema(panic system), fallo de aplicación, o "corrupción de datos". • http://secunia.com/advisories/21109 http://securitytracker.com/id?1016535 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102344-1 http://www.securityfocus.com/bid/19064 http://www.vupen.com/english/advisories/2006/2872 https://exchange.xforce.ibmcloud.com/vulnerabilities/27801 •

CVSS: 5.0EPSS: 4%CPEs: 11EXPL: 0

Unspecified vulnerability in NIS server on Sun Solaris 8, 9, and 10 allows local and remote attackers to cause a denial of service (ypserv hang) via unknown vectors. Vulnerabilidad no especificada en el servidor NIS sobre Sun Solaris 8, 9, y 10 permite a atacantes locales y remotos provocar denegación de servicio (culegue del ypserv) a través de vectores desconocidos. • http://secunia.com/advisories/21047 http://securitytracker.com/id?1016494 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1 http://www.securityfocus.com/bid/18972 http://www.vupen.com/english/advisories/2006/2799 https://exchange.xforce.ibmcloud.com/vulnerabilities/27722 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1921 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the libpkcs11 library in Sun Solaris 10 might allow local users to gain privileges or cause a denial of service (application failure) via unknown attack vectors that involve the getpwnam family of non-reentrant functions. Vulnerabilidad no especificada en la librería libpkcsll en Sun Solaris 10 podría permitir a usuarios locales ganar privilegios o causar una denegación de servicio (fallo de aplicación) mediante vectores de ataque desconocidos que implican la familia de funciones no reentrantes getpwnam. • http://secunia.com/advisories/19789 http://securitytracker.com/id?1015987 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102316-1 http://www.securityfocus.com/bid/17687 http://www.vupen.com/english/advisories/2006/1504 https://exchange.xforce.ibmcloud.com/vulnerabilities/26075 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

The Bourne shell (sh) in Solaris 8, 9, and 10 allows local users to cause a denial of service (sh crash) via an unspecified attack vector that causes sh processes to crash during creation of temporary files. • http://secunia.com/advisories/19627 http://secunia.com/advisories/21493 http://securitytracker.com/id?1015902 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102282-1 http://support.avaya.com/elmodocs2/security/ASA-2006-122.htm http://www.securityfocus.com/bid/17478 http://www.vupen.com/english/advisories/2006/1333 https://exchange.xforce.ibmcloud.com/vulnerabilities/25744 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A881 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •