CVE-2006-2064
https://notcve.org/view.php?id=CVE-2006-2064
Unspecified vulnerability in the libpkcs11 library in Sun Solaris 10 might allow local users to gain privileges or cause a denial of service (application failure) via unknown attack vectors that involve the getpwnam family of non-reentrant functions. Vulnerabilidad no especificada en la librería libpkcsll en Sun Solaris 10 podría permitir a usuarios locales ganar privilegios o causar una denegación de servicio (fallo de aplicación) mediante vectores de ataque desconocidos que implican la familia de funciones no reentrantes getpwnam. • http://secunia.com/advisories/19789 http://securitytracker.com/id?1015987 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102316-1 http://www.securityfocus.com/bid/17687 http://www.vupen.com/english/advisories/2006/1504 https://exchange.xforce.ibmcloud.com/vulnerabilities/26075 •
CVE-2006-1782
https://notcve.org/view.php?id=CVE-2006-1782
Unspecified vulnerability in Solaris 8 and 9 allows local users to obtain the LDAP Directory Server root Distinguished Name (rootDN) password when a privileged user (1) runs idsconfig; or "insecurely" runs LDAP2 commands with the -w option, including (2) ldapadd, (3) ldapdelete, (4) ldapmodify, (5) ldapmodrdn, and (6) ldapsearch. • http://secunia.com/advisories/19638 http://secunia.com/advisories/21493 http://securitytracker.com/id?1015903 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102113-1 http://support.avaya.com/elmodocs2/security/ASA-2006-122.htm http://www.osvdb.org/24563 http://www.osvdb.org/24564 http://www.osvdb.org/24565 http://www.osvdb.org/24566 http://www.osvdb.org/24567 http://www.osvdb.org/24568 http://www.securityfocus.com/bid/17479 http://www.vup •
CVE-2006-1780
https://notcve.org/view.php?id=CVE-2006-1780
The Bourne shell (sh) in Solaris 8, 9, and 10 allows local users to cause a denial of service (sh crash) via an unspecified attack vector that causes sh processes to crash during creation of temporary files. • http://secunia.com/advisories/19627 http://secunia.com/advisories/21493 http://securitytracker.com/id?1015902 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102282-1 http://support.avaya.com/elmodocs2/security/ASA-2006-122.htm http://www.securityfocus.com/bid/17478 http://www.vupen.com/english/advisories/2006/1333 https://exchange.xforce.ibmcloud.com/vulnerabilities/25744 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A881 •
CVE-2006-0745 – X.Org X11 (X11R6.9.0/X11R7.0) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-0745
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •
CVE-2006-1092
https://notcve.org/view.php?id=CVE-2006-1092
Unspecified vulnerability in the pagedata subsystem of the process file system (/proc) in Solaris 8 through 10 allows local users to cause a denial of service (system hang or panic) via unknown attack vectors that cause cause the kmem_oversize arena to allocate a large amount of system memory that does not get freed. • http://secunia.com/advisories/19128 http://secunia.com/advisories/19716 http://securitytracker.com/id?1015723 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102159-1 http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm http://www.securityfocus.com/bid/16966 http://www.vupen.com/english/advisories/2006/0829 https://exchange.xforce.ibmcloud.com/vulnerabilities/25152 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1618 •