
CVE-2017-3510
https://notcve.org/view.php?id=CVE-2017-3510
24 Apr 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones virtualized NIC driver). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise Solaris. While the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access ... • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html •

CVE-2017-3564
https://notcve.org/view.php?id=CVE-2017-3564
24 Apr 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RBAC). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability ... • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html •

CVE-2017-3474
https://notcve.org/view.php?id=CVE-2017-3474
24 Apr 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Zone). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality impacts). • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html •

CVE-2017-3551
https://notcve.org/view.php?id=CVE-2017-3551
24 Apr 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Smartcard Libraries). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Solaris as well as unauthorized update, insert or delete access t... • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html •

CVE-2017-3565
https://notcve.org/view.php?id=CVE-2017-3565
24 Apr 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: RBAC). The supported version that is affected is 11.3. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability ... • http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html •

CVE-2016-8330
https://notcve.org/view.php?id=CVE-2016-8330
27 Jan 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data. CVSS v3.0 Base Score 3.7 (Integrity impacts). • http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html • CWE-284: Improper Access Control •

CVE-2017-3276
https://notcve.org/view.php?id=CVE-2017-3276
27 Jan 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel Zones virtualized block driver). The supported version that is affected is 11.3. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Solaris accessible data and unauthorized ability to c... • http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html •

CVE-2016-9795 – CA Common Services casrvc Privilege Escalation
https://notcve.org/view.php?id=CVE-2016-9795
27 Jan 2017 — The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11, 11.3, 11.3.5, and 11.3.6 on AIX, HP-UX, Linux, and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validatio... • https://github.com/blogresponder/CA-Common-Services-privilege-escalation-cve-2016-9795-revisited • CWE-20: Improper Input Validation •

CVE-2017-3301
https://notcve.org/view.php?id=CVE-2017-3301
27 Jan 2017 — Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is affected is 11.3. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data. • http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html •

CVE-2015-8786 – rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
https://notcve.org/view.php?id=CVE-2015-8786
09 Dec 2016 — The Management plugin in RabbitMQ before 3.6.1 allows remote authenticated users with certain privileges to cause a denial of service (resource consumption) via the (1) lengths_age or (2) lengths_incr parameter. El plugin Management en RabbitMQ en versiones anteriores a 3.6.1 permite a usuarios remotos autenticados con ciertos privilegios provocar una denegación de servicio (consumo de recursos) a través del parámetro (1) lengths_age o (2) lengths_incr. A resource-consumption flaw was found in RabbitMQ Serv... • http://rhn.redhat.com/errata/RHSA-2017-0226.html • CWE-399: Resource Management Errors CWE-400: Uncontrolled Resource Consumption •