Page 53 of 364 results (0.008 seconds)

CVSS: 4.6EPSS: 0%CPEs: 6EXPL: 0

The (1) Simplified Chinese, (2) Traditional Chinese, (3) Korean, and (4) Thai language input methods in Sun Solaris 10 create files and directories with weak permissions under (a) .iiim/le and (b) .Xlocale in home directories, which might allow local users to write to, or read from, the home directories of other users. Los métodos de entrada de (1) Chino Simplicado, (2) Chino Tradicional , (3) Coreano y (4) Tailandés en Sun Solaris 10 crean archivos y directorios con permisos débiles bajo a) .iiim/le y (b) .Xlocale en los directorios home, que podrían permitir a usuarios locales escribir en, o leer de los directorios home de otros usuarios. • http://secunia.com/advisories/28931 http://sunsolve.sun.com/search/document.do?assetkey=1-26-201315-1 http://www.securityfocus.com/bid/27770 http://www.vupen.com/english/advisories/2008/0452 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5545 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.7EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in the USB Mouse STREAMS module (usbms) in Sun Solaris 9 and 10, when 64-bit mode is enabled, allows local users to cause a denial of service (panic) via unspecified vectors. Vulnerabilidad sin especificar en el USB Mouse STREAMS module (usbms)en Sun Solaris 9 y 10, cuando el modo 64-bits está activado, permite a usuarios locales provocar una denegación de servicio (error irrecuperable del sistema) mediante vectores sin identificar. • http://secunia.com/advisories/28921 http://sunsolve.sun.com/search/document.do?assetkey=1-26-201316-1 http://www.securityfocus.com/bid/27773 http://www.vupen.com/english/advisories/2008/0451 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5474 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in libdevinfo in Sun Solaris 10 allows local users to access files and gain privileges via unknown vectors, related to login device permissions. Vulnerabilidad no especificada en libdevinfo de Sun Solaris 10, permite que usuario locales puedan acceder a ficheros y que obtengan privilegios, usando vectores desconocidos, relacionados con los permisos del dispositivo de login. • http://secunia.com/advisories/28493 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103165-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200641-1 http://www.securityfocus.com/bid/27253 http://www.securitytracker.com/id?1019187 http://www.vupen.com/english/advisories/2008/0131 https://exchange.xforce.ibmcloud.com/vulnerabilities/39629 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5211 •

CVSS: 7.8EPSS: 4%CPEs: 13EXPL: 0

Unspecified vulnerability in the Device Manager daemon (utdevmgrd) in Sun Ray Server Software 2.0, 3.0, 3.1, and 3.1.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors. Vulnerabilidad no especificada en el demonio Device Manager (utdevmgrd) en Sun Ray Server Software 2.0, 3.0, 3.1, y 3.1.1 permite a atacantes remotos provocar denegación de servicio (caida de demonio) a través de vectores no especificados. • http://osvdb.org/40846 http://secunia.com/advisories/28148 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103175-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201227-1 http://www.securityfocus.com/bid/26944 http://www.securitytracker.com/id?1019118 http://www.vupen.com/english/advisories/2007/4269 https://exchange.xforce.ibmcloud.com/vulnerabilities/39133 •

CVSS: 9.3EPSS: 1%CPEs: 2EXPL: 0

Sun Solaris 10 with the 120011-04 and 120012-04 patches, and later 120011-* and 120012-* patches, allows remote attackers to bypass certain netgroup restrictions and obtain root access to a filesystem via NFS requests from a client root user. Sun Solaris 10 con los parches 120011-04 y 120012-04, y posteriores parches 120011-* y 120012-*, permite a atacantes remotos evitar ciertas restricciones de ciertros grupos de red y obtener acceso de root a sistemas de archivo a través de una respuesta NFS desde un usuario cliente root. • http://osvdb.org/40829 http://secunia.com/advisories/28096 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103162-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201317-1 http://www.securityfocus.com/bid/26872 http://www.securitytracker.com/id?1019102 http://www.vupen.com/english/advisories/2007/4218 https://exchange.xforce.ibmcloud.com/vulnerabilities/39033 • CWE-264: Permissions, Privileges, and Access Controls •