Page 48 of 564 results (0.018 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Multiple unspecified vulnerabilities in tip in Sun Solaris 8, 9, and 10 allow local users to gain uucp account privileges via unspecified vectors. Múltiples vulnerabilidades no especificadas en tip de Sun Solaris 8, 9, y 10 permite a usuarios locales obtener privilegios de cuentas uucp mediante vectores no especificados. • http://osvdb.org/31616 http://secunia.com/advisories/23821 http://securitytracker.com/id?1017546 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102773-1 http://www.securityfocus.com/bid/22190 http://www.vupen.com/english/advisories/2007/0317 https://exchange.xforce.ibmcloud.com/vulnerabilities/31669 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2038 •

CVSS: 7.8EPSS: 54%CPEs: 2EXPL: 1

Unspecified vulnerability in libnsl in Sun Solaris 8 and 9 allows remote attackers to cause a denial of service (crash) via malformed RPC requests that trigger a crash in rpcbind. Vulnerabilidad no especificada en libnsl de Sun Solaris 8 y 9 permite a atacantes remotos provocar una denegación de servicio (caída) mediante peticiones RPC manipuladas que disparan una caída en rpcbind. • https://www.exploit-db.com/exploits/29406 http://osvdb.org/31576 http://secunia.com/advisories/23700 http://secunia.com/advisories/24056 http://securitytracker.com/id?1017492 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102713-1 http://support.avaya.com/elmodocs2/security/ASA-2007-036.htm http://www.securityfocus.com/bid/21964 http://www.vupen.com/english/advisories/2007/0110 https://exchange.xforce.ibmcloud.com/vulnerabilities/31366 https://oval.cisecurity.org •

CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via a .. (dot dot) sequence in the LANG environment variable that points to a locale file containing attacker-controlled format string specifiers. Vulnerabilidad de escalado de directorio en ld.so.1 del Sun Solaris 8, 9 y 10 permite a usuarios locales ejecutar código de su elección a través de la secuencia .. (punto punto) en la variable de entorno LANG que señala a un fichero local que contiene controles de ataque en un formato de cadena específico. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=449 http://secunia.com/advisories/23317 http://securitytracker.com/id?1017376 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1 http://www.securityfocus.com/bid/21564 http://www.vupen.com/english/advisories/2006/4979 https://exchange.xforce.ibmcloud.com/vulnerabilities/30849 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2121 •

CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 0

Stack-based buffer overflow in ld.so.1 in Sun Solaris 8, 9, and 10 allows local users to execute arbitrary code via large precision padding values in a format string specifier in the format parameter of the doprf function. NOTE: this issue normally does not cross privilege boundaries, except in cases of external introduction of malicious message files, or if it is leveraged with other vulnerabilities such as CVE-2006-6494. Desbordamiento de búfer en el ld.so.1 del Sun Solaris 8, 9 y 10 permite a atacantes locales ejecutar código de su elección a través de valores de relleno de gran precisión con un formato de cadena específico, en el parámetro de formato de la función doprf .NOTA: Esta vulnerabilidad no suele traspasar los límites de los privilegios, a excepción de los casos en los que se introducen ficheros externos con mensajes maliciosos, o si se combina con otras vulnerabilidades como puede ser la CVE-2006-6494. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=450 http://secunia.com/advisories/23317 http://secunia.com/advisories/23991 http://securitytracker.com/id?1017376 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102724-1 http://support.avaya.com/elmodocs2/security/ASA-2007-019.htm http://www.securityfocus.com/bid/21564 http://www.vupen.com/english/advisories/2006/4979 https://exchange.xforce.ibmcloud.com/vulnerabilities/30848 https://oval.cisecurity.org/repo •

CVSS: 4.7EPSS: 0%CPEs: 6EXPL: 0

Race condition in the kernel in Sun Solaris 8 through 10 allows local users to cause a denial of service (panic) via unspecified vectors, possibly related to the exitlwps function and SIGKILL and /proc PCAGENT signals. Condición de carrera en el núcleo de Sun Solaris 8 hasta 10 permite a usuarios locales provocar una denegación de servicio (panic) a través de vectores no especificados, posiblemente relacionados con la función exitlwps y las señales SIGKILL y /proc PCAGENT. • http://secunia.com/advisories/23187 http://securitytracker.com/id?1017321 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102574-1 http://www.securityfocus.com/bid/21372 http://www.vupen.com/english/advisories/2006/4792 https://exchange.xforce.ibmcloud.com/vulnerabilities/30637 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1626 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •