Page 8 of 96 results (0.022 seconds)

CVSS: 5.0EPSS: 10%CPEs: 9EXPL: 0

Unknown vulnerability in UDP RPC for Solaris 2.5.1 through 9 for SPARC, and 2.5.1 through 8 for x86, allows remote attackers to cause a denial of service (memory consumption) via certain arguments in RPC calls that cause large amounts of memory to be allocated. • http://secunia.com/advisories/8092 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50626-1 http://www.securityfocus.com/bid/6883 http://www.securitytracker.com/id?1006131 https://exchange.xforce.ibmcloud.com/vulnerabilities/11368 •

CVSS: 1.2EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in mail for Solaris 2.6 through 9 allows local users to read the email of other users. • http://secunia.com/advisories/8058 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50751-1 http://www.securityfocus.com/bid/6838 http://www.securitytracker.com/id?1006084 https://exchange.xforce.ibmcloud.com/vulnerabilities/11303 •

CVSS: 5.0EPSS: 56%CPEs: 10EXPL: 0

Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure. Vulnerabilidad de atravesamiento de directorios en el demonio servidor de Sun Kodak Color Management System (KMCS) (kcms_server) permite a atacantes remotos leer ficheros arbitrarios mediante el procedimiento KCS_OPEN_PROFILE • http://marc.info/?l=bugtraq&m=104326556329850&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50104 http://www.entercept.com/news/uspr/01-22-03.asp http://www.kb.cert.org/vuls/id/850785 http://www.securityfocus.com/bid/6665 https://exchange.xforce.ibmcloud.com/vulnerabilities/11129 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A120 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A195 https: •

CVSS: 5.0EPSS: 10%CPEs: 8EXPL: 0

Unknown vulnerability in the FTP server (in.ftpd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (temporary FTP server hang), which affects other active mode FTP clients. • http://secunia.com/advisories/7968 http://sunsolve.sun.com/search/document.do?assetkey=1-26-50240-1 http://www.securityfocus.com/bid/6709 http://www.securitytracker.com/id?1005996 https://exchange.xforce.ibmcloud.com/vulnerabilities/11186 •

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 3

rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header. • https://www.exploit-db.com/exploits/22120 http://secunia.com/advisories/7825 http://sunsolve.sun.com/search/document.do?assetkey=1-26-51980-1 http://www.kb.cert.org/vuls/id/944241 http://www.securityfocus.com/archive/1/305105 http://www.securityfocus.com/bid/6509 http://www.securitytracker.com/id?1005882 http://www.securitytracker.com/id?1006682 https://exchange.xforce.ibmcloud.com/vulnerabilities/11608 •