Page 8 of 209 results (0.014 seconds)

CVSS: 4.7EPSS: 0%CPEs: 227EXPL: 0

Kerberos in Sun Solaris 8, 9, and 10, and OpenSolaris before snv_117, does not properly manage credential caches, which allows local users to access Kerberized NFS mount points and Kerberized NFS shares via unspecified vectors. Kerberos in Sun Solaris 8, 9, y 10, y OpenSolaris anterior a snv_117, no administra adecuadamente las credenciales de caché, lo que permite a usuarios locales acceder a puntos de montaje "Kerberized NFS" y recursos compartidos "Kerberized NFS" a través de vectores no especificados. • http://secunia.com/advisories/35341 http://secunia.com/advisories/35414 http://sunsolve.sun.com/search/document.do?assetkey=1-21-140841-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-252787-1 http://support.avaya.com/elmodocs2/security/ASA-2009-210.htm http://www.securityfocus.com/bid/35205 http://www.vupen.com/english/advisories/2009/1499 http://www.vupen.com/english/advisories/2009/1559 • CWE-255: Credentials Management Errors •

CVSS: 10.0EPSS: 86%CPEs: 4EXPL: 0

Integer overflow in sadmind in Sun Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted RPC request that triggers a heap-based buffer overflow, related to improper memory allocation. Desbordamiento de entero en sadmind en Sun Solaris v8 y v9 permite a atacantes remotos ejecutar código de forma arbitraria a través de una petición RPC manipulada que inicia un desbordamiento de búfer basado en montículo, relacionado con una localización de memoria no adecuada. • http://secunia.com/advisories/32473 http://secunia.com/advisories/35191 http://secunia.com/secunia_research/2008-47 http://sunsolve.sun.com/search/document.do?assetkey=1-21-116455-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1 http://support.avaya.com/elmodocs2/security/ASA-2009-195.htm http://www.osvdb.org/54668 http://www.securityfocus.com/archive/1/503772/100/0/threaded http://www.securityfocus.com/bid/35083 http://www.securitytracker.com/ • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 64%CPEs: 4EXPL: 0

Heap-based buffer overflow in sadmind in Sun Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted RPC request, related to improper decoding of request parameters. Desbordamiento de búfer basado en entero en sadmind en Sun Solaris v8 y v9 permite a atacantes remotos ejecutar código de forma arbitraria a través de unas peticiones RPC manipuladas, relacionado con la decodificación inadecuada de parámetros "request". • http://secunia.com/advisories/32473 http://secunia.com/advisories/35191 http://secunia.com/secunia_research/2008-45 http://sunsolve.sun.com/search/document.do?assetkey=1-21-116455-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1 http://support.avaya.com/elmodocs2/security/ASA-2009-195.htm http://www.osvdb.org/54663 http://www.securityfocus.com/archive/1/503771/100/0/threaded http://www.securityfocus.com/bid/35083 http://www.securitytracker.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.1EPSS: 0%CPEs: 226EXPL: 0

XScreenSaver in Sun Solaris 10 and OpenSolaris before snv_109, and Solaris 8 and 9 with GNOME 2.0 or 2.0.2, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, as demonstrated by Thunderbird new-mail notifications. XScreenSaver en Sun Solaris v10 and OpenSolaris anteriores a snv_109, y Solaris v8 y v9 con GNOME v2.0 o v2.0.2, permite a atacantes próximos físicamente conseguir información sensible, leyendo las ventanas "PopUp"s, que se muestran cuando la pantalla se bloquea, como se demostró en las notificaciones de nuevo mensaje de Thunderbird. • http://securitytracker.com/id?1022009 http://sunsolve.sun.com/search/document.do?assetkey=1-21-120094-22-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-255308-1 http://www.securityfocus.com/bid/34421 http://www.vupen.com/english/advisories/2009/0978 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.4EPSS: 0%CPEs: 227EXPL: 0

Race condition in the dircmp script in Sun Solaris 8 through 10, and OpenSolaris snv_01 through snv_111, allows local users to overwrite arbitrary files, probably involving a symlink attack on temporary files. Condición Race en la secuencia de comandos en Sun Solaris v8 hasta v10, y OpenSolaris snv_01 hasta snv_111, permite a los usuario locales sobrescribir arbitrariamente archivos, probablemente involucra un ataque de enlace simbólico en archivos temporales. • http://secunia.com/advisories/34558 http://secunia.com/advisories/34813 http://sunsolve.sun.com/search/document.do?assetkey=1-21-138897-01-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-253468-1 http://support.avaya.com/elmodocs2/security/ASA-2009-140.htm http://www.securityfocus.com/bid/34316 http://www.vupen.com/english/advisories/2009/1105 https://exchange.xforce.ibmcloud.com/vulnerabilities/49526 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mit • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •