Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Sun Solaris 10.x

This vulnerability report for Sun Solaris 10.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Sun Solaris 10.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Sun Microsystems

Product Link View Here (Link to external site)

Affected By 542 Secunia advisories
1724 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 2% (10 of 542 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Sun Solaris 10.x, with all vendor patches applied, is rated Highly critical .




57 Secunia Advisories in 2006

Secunia has issued a total of 57 Secunia advisories in 2006 for Sun Solaris 10.x. Currently, 2% (1 out of 57) are marked as unpatched with the most severe being rated Not critical

More information about the specific Secunia advisories affecting Sun Solaris 10.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Sun Solaris WAN Boot RSA Signature Forgery Vulnerability
Vendor Patch. Secunia Advisory 1 of 57 in 2006. 10,647 views.
Release Date:
2006-12-26
Secunia Advisory ID:
SA23455
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Solaris OpenSSL Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 57 in 2006. 12,933 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23351
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Sun acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris ld.so Directory Traversal and Buffer Overflow
Vendor Workaround. Secunia Advisory 3 of 57 in 2006. 11,526 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23317
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability and a security issue have been reported in Sun Solaris, which can be exploited by malicious, local users to disclose sensitive information or potentially gain escalated privileges. [Read More]


Sun Solaris Unspecified Local Denial of Service
Vendor Patch. Secunia Advisory 4 of 57 in 2006. 12,362 views.
Release Date:
2006-12-01
Secunia Advisory ID:
SA23187
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris libike RSA Signature Forgery
Vendor Patch. Secunia Advisory 5 of 57 in 2006. 10,660 views.
Release Date:
2006-11-28
Secunia Advisory ID:
SA23104
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Solaris Net-SNMP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 57 in 2006. 13,092 views.
Release Date:
2006-11-23
Secunia Advisory ID:
SA23058
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris Gimp XCF Parsing Buffer Overflow Vulnerability
Partial Fix. Secunia Advisory 7 of 57 in 2006. 12,328 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23044
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Sun Microsystems has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Sun Solaris libXfont Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 8 of 57 in 2006. 13,732 views.
Release Date:
2006-11-15
Secunia Advisory ID:
SA22907
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Sun Solaris OpenSSL Vulnerabilities
Partial Fix. Secunia Advisory 9 of 57 in 2006. 13,392 views.
Release Date:
2006-11-10
Secunia Advisory ID:
SA22791
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Sun has acknowledged some vulnerabilities in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Sun Solaris UFS File System Denial Of Service
Unpatched. Secunia Advisory 10 of 57 in 2006. 15,141 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22714
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris NVIDIA Graphics Driver Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 11 of 57 in 2006. 11,556 views.
Release Date:
2006-11-03
Secunia Advisory ID:
SA22676
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a user's system. [Read More]


Sun JES / Solaris OpenSSL RSA Signature Forgery
Partial Fix. Secunia Advisory 12 of 57 in 2006. 12,663 views.
Release Date:
2006-10-26
Secunia Advisory ID:
SA22585
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Sun Java Enterprise System and Solaris, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Sun Solaris TCP Fusion Local Denial of Service
Vendor Patch. Secunia Advisory 13 of 57 in 2006. 9,642 views.
Release Date:
2006-10-18
Secunia Advisory ID:
SA22453
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Solaris Netscape Portable Runtime Privilege Escalation
Vendor Patch. Secunia Advisory 14 of 57 in 2006. 10,074 views.
Release Date:
2006-10-12
Secunia Advisory ID:
SA22348
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges or cause a DoS (Denial of Service). [Read More]


Sun Solaris Apache "mod_rewrite" and "mod_imap" Vulnerabilities
Vendor Patch. Secunia Advisory 15 of 57 in 2006. 12,726 views.
Release Date:
2006-10-12
Secunia Advisory ID:
SA22388
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a vulnerable system. [Read More]


Sun Solaris update for Apache 2
Vendor Patch. Secunia Advisory 16 of 57 in 2006. 12,249 views.
Release Date:
2006-10-12
Secunia Advisory ID:
SA22368
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Sun has issued an update for Apache 2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. [Read More]


Sun Solaris Sendmail Long Header Denial of Service
Vendor Workaround. Secunia Advisory 17 of 57 in 2006. 10,330 views.
Release Date:
2006-10-11
Secunia Advisory ID:
SA22369
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris X Display Manager "Xsession" Script Security Issue
Vendor Workaround. Secunia Advisory 18 of 57 in 2006. 12,985 views.
Release Date:
2006-10-09
Secunia Advisory ID:
SA22323
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to gain access to system information. [Read More]


Sun Solaris Link Aggregation Insecure Default Permissions
Vendor Patch. Secunia Advisory 19 of 57 in 2006. 8,954 views.
Release Date:
2006-10-09
Secunia Advisory ID:
SA22246
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Sun Solaris update for Apache 2 mod_ssl module
Vendor Patch. Secunia Advisory 20 of 57 in 2006. 10,370 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22233
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Sun has issued an update for the Apache 2 mod_ssl module. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris RSA Signature Forgery Vulnerability
Partial Fix. Secunia Advisory 21 of 57 in 2006. 14,588 views.
Release Date:
2006-10-04
Secunia Advisory ID:
SA22226
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in various products included in Solaris, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Sun Solaris IPv6 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 22 of 57 in 2006. 9,703 views.
Release Date:
2006-09-29
Secunia Advisory ID:
SA22132
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris Kernel SSL Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 23 of 57 in 2006. 12,426 views.
Release Date:
2006-09-27
Secunia Advisory ID:
SA22136
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Solaris IPv6 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 24 of 57 in 2006. 10,399 views.
Release Date:
2006-09-26
Secunia Advisory ID:
SA22103
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris "syslog" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 25 of 57 in 2006. 12,019 views.
Release Date:
2006-09-26
Secunia Advisory ID:
SA22083
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris libX11 Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 26 of 57 in 2006. 12,583 views.
Release Date:
2006-09-08
Secunia Advisory ID:
SA21815
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Sun Solaris pkgadd Insecure File Permissions
Vendor Patch. Secunia Advisory 27 of 57 in 2006. 14,989 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21633
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to disclose sensitive information or gain escalated privileges. [Read More]


Sun Solaris update for mozilla
Vendor Patch. Secunia Advisory 28 of 57 in 2006. 17,728 views.
Release Date:
2006-08-25
Secunia Advisory ID:
SA21622
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Sun has acknowledged some vulnerabilities in mozilla for Sun Solaris. These can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting and phishing attacks, and compromise a vulnerable system. [Read More]


Sun Solaris RBAC Profile Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 57 in 2006. 14,565 views.
Release Date:
2006-08-23
Secunia Advisory ID:
SA21581
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Sun Solaris netstat/SNMP queries and ifconfig Race Condition
Vendor Workaround. Secunia Advisory 30 of 57 in 2006. 14,773 views.
Release Date:
2006-08-14
Secunia Advisory ID:
SA21471
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris "drain_squeue()" Denial of Service
Vendor Workaround. Secunia Advisory 31 of 57 in 2006. 9,857 views.
Release Date:
2006-08-10
Secunia Advisory ID:
SA21453
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Fire T2000 Incorrect DSA Signature Verification
Vendor Patch. Secunia Advisory 32 of 57 in 2006. 7,269 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21279
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
A security issue has been reported in Sun Fire T2000, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Sun Solaris ACK Storm Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 33 of 57 in 2006. 15,154 views.
Release Date:
2006-07-27
Secunia Advisory ID:
SA21226
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris sysinfo() Kernel Memory Disclosure
Vendor Patch. Secunia Advisory 34 of 57 in 2006. 11,079 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21148
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. [Read More]


Sun Solaris IP Implementation Routing Table Bypass
Vendor Patch. Secunia Advisory 35 of 57 in 2006. 14,006 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21163
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to bypass certain restrictions. [Read More]


Sun Solaris Event Port API Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 36 of 57 in 2006. 12,053 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21132
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Solaris, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris Kernel Debugger Local Denial of Service
Vendor Patch. Secunia Advisory 37 of 57 in 2006. 10,208 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21133
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris "/net" Mount Point Local Denial of Service
Vendor Patch. Secunia Advisory 38 of 57 in 2006. 17,024 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21131
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris Kernel Patches Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 39 of 57 in 2006. 11,317 views.
Release Date:
2006-07-19
Secunia Advisory ID:
SA21109
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris ypserv Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 40 of 57 in 2006. 10,669 views.
Release Date:
2006-07-14
Secunia Advisory ID:
SA21047
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Solaris, which may be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Solaris update for sendmail
Vendor Workaround. Secunia Advisory 41 of 57 in 2006. 13,453 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20650
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Sun has acknowledged an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Sun Solaris libike Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 42 of 57 in 2006. 12,191 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20050
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Sun Solaris update for Xorg X Server
Vendor Patch. Secunia Advisory 43 of 57 in 2006. 11,584 views.
Release Date:
2006-05-05
Secunia Advisory ID:
SA19983
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Sun has issued an update for Xorg X server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Sun Solaris "libpkcs11" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 44 of 57 in 2006. 11,228 views.
Release Date:
2006-04-25
Secunia Advisory ID:
SA19789
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Sun Solaris "sh" Process Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 45 of 57 in 2006. 13,289 views.
Release Date:
2006-04-12
Secunia Advisory ID:
SA19627
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris Sendmail Signal Handling Memory Corruption
Vendor Patch. Secunia Advisory 46 of 57 in 2006. 16,467 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19360
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Sun Solaris update for Xorg X Server
Vendor Patch. Secunia Advisory 47 of 57 in 2006. 11,540 views.
Release Date:
2006-03-21
Secunia Advisory ID:
SA19311
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Sun has issued an update for Xorg X Server. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Sun Solaris "/proc" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 48 of 57 in 2006. 16,014 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19128
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris Multiple Apache Vulnerabilities
Vendor Workaround. Secunia Advisory 49 of 57 in 2006. 15,615 views.
Release Date:
2006-03-02
Secunia Advisory ID:
SA19073
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Privilege escalation
Where:
From remote
Short Description:
Sun has acknowledged some vulnerabilities in Apache for Solaris, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to conduct HTTP request smuggling attacks and potentially bypass certain security restrictions. [Read More]


Sun Solaris Multiple Apache2 Vulnerabilities
Vendor Patch. Secunia Advisory 50 of 57 in 2006. 17,339 views.
Release Date:
2006-03-02
Secunia Advisory ID:
SA19072
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Sun has acknowledged some vulnerabilities in Apache2 for Solaris, where the most critical can be exploited by malicious people to cause a DoS (Denial of Service), conduct HTTP request smuggling attacks, and bypass certain security restrictions. [Read More]


Sun Solaris update for Perl
Vendor Patch. Secunia Advisory 51 of 57 in 2006. 13,454 views.
Release Date:
2006-03-01
Secunia Advisory ID:
SA19041
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Sun has issued an update for perl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable Perl application. [Read More]


Sun Solaris HSFS File System Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 52 of 57 in 2006. 12,897 views.
Release Date:
2006-02-27
Secunia Advisory ID:
SA19042
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Sun Solaris "in.rexecd" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 53 of 57 in 2006. 11,066 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18891
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Sun Solaris x64 Kernel Processing Denial of Service
Vendor Patch. Secunia Advisory 54 of 57 in 2006. 9,956 views.
Release Date:
2006-02-01
Secunia Advisory ID:
SA18671
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Sun Solaris lpsched Unspecified Vulnerability
Vendor Patch. Secunia Advisory 55 of 57 in 2006. 13,561 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18498
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in lpsched, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Sun Solaris Unspecified Privilege Escalation and Denial of Service
Vendor Patch. Secunia Advisory 56 of 57 in 2006. 11,810 views.
Release Date:
2006-01-12
Secunia Advisory ID:
SA18421
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Sun Solaris "/proc" Filesystem Searching Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 57 of 57 in 2006. 12,325 views.
Release Date:
2006-01-12
Secunia Advisory ID:
SA18420
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Sun Solaris 10.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability