Oracle

Solaris

548 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.81%
  • Veröffentlicht 20.10.2008 17:59:26
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vect...

Exploit
  • EPSS 91.06%
  • Veröffentlicht 12.02.2007 20:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to...

  • EPSS 0.11%
  • Veröffentlicht 04.10.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.

Exploit
  • EPSS 9.61%
  • Veröffentlicht 18.08.2004 04:00:00
  • Zuletzt bearbeitet 02.05.2025 16:40:41

TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that u...

Exploit
  • EPSS 51.42%
  • Veröffentlicht 07.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

  • EPSS 4.7%
  • Veröffentlicht 18.06.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.

  • EPSS 0.59%
  • Veröffentlicht 01.08.1997 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

  • EPSS 2.83%
  • Veröffentlicht 06.02.1997 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow of rlogin program using TERM environmental variable.