Page 67 of 364 results (0.006 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Sun Solaris 10 allows local users to cause a denial of service (panic) via unspecified vectors involving (1) the /net mount point and (2) the "-hosts" map in a mount point. Sun Solaris 10 permite a usuarios locales provocar denegación de servicio(panic) a través de vectores no especificados afectando al punto de montaje /net y (2) el mapa "-host" en un punto de montaje. • http://secunia.com/advisories/21131 http://securitytracker.com/id?1016541 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102286-1 http://www.securityfocus.com/bid/19085 http://www.vupen.com/english/advisories/2006/2884 https://exchange.xforce.ibmcloud.com/vulnerabilities/27841 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the kernel in Solaris 10 with patch 118822-29 (118844-29 on x86) and without patch 118833-11 (118855-08) allows remote authenticated users to cause a denial of service via unspecified vectors that lead to "kernel data structure corruption" that can trigger a system panic, application failure, or "data corruption." Vulnerabilidad no especificada en el Kernel en Solaris 10 con 118822-29 (118844-29 sobre x86) y sin el parche 118833-11 (118855-08) permite a usuarios remotos validados provocar denegación de servicios a través de vectores no especificados que llevan a "corrupción de la estructura de datos del kernel" que puede disparar panico del sistema(panic system), fallo de aplicación, o "corrupción de datos". • http://secunia.com/advisories/21109 http://securitytracker.com/id?1016535 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102344-1 http://www.securityfocus.com/bid/19064 http://www.vupen.com/english/advisories/2006/2872 https://exchange.xforce.ibmcloud.com/vulnerabilities/27801 •

CVSS: 5.0EPSS: 6%CPEs: 11EXPL: 0

Unspecified vulnerability in NIS server on Sun Solaris 8, 9, and 10 allows local and remote attackers to cause a denial of service (ypserv hang) via unknown vectors. Vulnerabilidad no especificada en el servidor NIS sobre Sun Solaris 8, 9, y 10 permite a atacantes locales y remotos provocar denegación de servicio (culegue del ypserv) a través de vectores desconocidos. • http://secunia.com/advisories/21047 http://securitytracker.com/id?1016494 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102462-1 http://www.securityfocus.com/bid/18972 http://www.vupen.com/english/advisories/2006/2799 https://exchange.xforce.ibmcloud.com/vulnerabilities/27722 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1921 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the libpkcs11 library in Sun Solaris 10 might allow local users to gain privileges or cause a denial of service (application failure) via unknown attack vectors that involve the getpwnam family of non-reentrant functions. Vulnerabilidad no especificada en la librería libpkcsll en Sun Solaris 10 podría permitir a usuarios locales ganar privilegios o causar una denegación de servicio (fallo de aplicación) mediante vectores de ataque desconocidos que implican la familia de funciones no reentrantes getpwnam. • http://secunia.com/advisories/19789 http://securitytracker.com/id?1015987 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102316-1 http://www.securityfocus.com/bid/17687 http://www.vupen.com/english/advisories/2006/1504 https://exchange.xforce.ibmcloud.com/vulnerabilities/26075 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

The Bourne shell (sh) in Solaris 8, 9, and 10 allows local users to cause a denial of service (sh crash) via an unspecified attack vector that causes sh processes to crash during creation of temporary files. • http://secunia.com/advisories/19627 http://secunia.com/advisories/21493 http://securitytracker.com/id?1015902 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102282-1 http://support.avaya.com/elmodocs2/security/ASA-2006-122.htm http://www.securityfocus.com/bid/17478 http://www.vupen.com/english/advisories/2006/1333 https://exchange.xforce.ibmcloud.com/vulnerabilities/25744 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A881 •