Page 42 of 564 results (0.020 seconds)

CVSS: 10.0EPSS: 8%CPEs: 3EXPL: 0

Multiple unspecified vulnerabilities in Solaris print service for Sun Solaris 8, 9, and 10 allow remote attackers to cause a denial of service or execute arbitrary code via unknown vectors. Múltiples vulnerabilidades sin especificar en el servicio de impresión Solaris para Sun Solaris 8, 9 y 10 permite a atacantes remotos provocar una denegación de servicio o ejecutar código de su elección mediante vectores desconocidos. • http://secunia.com/advisories/30184 http://secunia.com/advisories/30473 http://sunsolve.sun.com/search/document.do?assetkey=1-26-236884-1 http://support.avaya.com/elmodocs2/security/ASA-2008-216.htm http://www.securityfocus.com/bid/29135 http://www.securitytracker.com/id?1020003 http://www.vupen.com/english/advisories/2008/1473/references http://www.vupen.com/english/advisories/2008/1709/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42322 https://oval.cisecurity.org •

CVSS: 7.8EPSS: 3%CPEs: 3EXPL: 0

The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack. La implementación del protocolo TCP en Sun Solaris versiones 8, 9 y 10 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU excesivo y fin del tiempo de espera en las nuevas conexiones) mediante ataques de saturación de paquetes TCP SYN. • http://secunia.com/advisories/30125 http://secunia.com/advisories/30131 http://sunsolve.sun.com/search/document.do?assetkey=1-26-200864-1 http://support.avaya.com/elmodocs2/security/ASA-2008-206.htm http://www.securityfocus.com/bid/29089 http://www.securitytracker.com/id?1019989 http://www.vupen.com/english/advisories/2008/1453/references http://www.vupen.com/english/advisories/2008/1585/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42264 • CWE-16: Configuration •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the floating point context switch implementation in Sun Solaris 9 and 10 on x86 platforms might allow local users to cause a denial of service (application exit), corrupt data, or trigger incorrect calculations via unknown vectors. Vulnerabilidad no especificada en la implementación de conmutación de contexto de punto flotante en Sun Solaris 9 y 10 en plataformas x86, podría permitir a usuarios locales provocar una denegación de servicio (salida de aplicación), corrupción de datos, o dispararía calculos incorrectos a través de vectores desconocidos. • http://secunia.com/advisories/29728 http://sunsolve.sun.com/search/document.do?assetkey=1-26-233921-1 http://www.securityfocus.com/bid/28733 http://www.securitytracker.com/id?1019833 http://www.vupen.com/english/advisories/2008/1193/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41765 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4950 • CWE-16: Configuration •

CVSS: 4.3EPSS: 10%CPEs: 2EXPL: 2

rpc.metad in Sun Solaris 10 allows remote attackers to cause a denial of service (daemon crash) via a malformed RPC request. rpc.metad de Sun Solaris 10 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de una petición RPC malformada. • https://www.exploit-db.com/exploits/5258 http://secunia.com/advisories/29418 http://sunsolve.sun.com/search/document.do?assetkey=1-26-249146-1 http://support.avaya.com/elmodocs2/security/ASA-2009-015.htm http://www.securityfocus.com/bid/28261 http://www.securitytracker.com/id?1019652 http://www.vupen.com/english/advisories/2008/0918/references http://www.vupen.com/english/advisories/2009/0206 https://exchange.xforce.ibmcloud.com/vulnerabilities/41224 https://oval.cisecurity.org&#x •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

A certain incorrect Sun Solaris 10 image on SPARC Enterprise T5120 and T5220 servers has /etc/default/login and /etc/ssh/sshd_config files that configure root logins in a manner unintended by the vendor, which allows remote attackers to gain privileges via unspecified vectors. Alguna imagen incorrecta de Sun Solaris 10 sobre servidores SPARC Enterprise T5120 y T5220 tiene los ficheros /etc/default/login y /etc/ssh/sshd_config que configuran los logins de root de una forma involuntaria por parte del fabricante, permite a atacantes remotos obtener privilegios a través de vectores desconocidos. • http://secunia.com/advisories/29529 http://sunsolve.sun.com/search/document.do?assetkey=1-66-231244-1 http://www.securityfocus.com/bid/28469 http://www.securitytracker.com/id?1019708 http://www.vupen.com/english/advisories/2008/0810/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41332 • CWE-264: Permissions, Privileges, and Access Controls •