Filtered by vendor Sun
Subscriptions
Total
1711 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2003-0413 | 1 Sun | 1 One Application Server | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in the webapps-simple sample application for (1) Sun ONE Application Server 7.0 for Windows 2000/XP or (2) Sun Java System Web Server 6.1 allows remote attackers to insert arbitrary web script or HTML via an HTTP request that generates an "Invalid JSP file" error, which inserts the text in the resulting error message. | ||||
CVE-2003-0414 | 1 Sun | 1 One Application Server | 2025-04-03 | N/A |
The installation of Sun ONE Application Server 7.0 for Windows 2000/XP creates a statefile with world-readable permissions, which allows local users to gain privileges by reading a plaintext password in the statefile. | ||||
CVE-2006-3159 | 1 Sun | 2 Iplanet Messaging Server, One Messaging Server | 2025-04-03 | N/A |
pipe_master in Sun ONE/iPlanet Messaging Server 5.2 HotFix 1.16 (built May 14 2003) allows local users to read portions of restricted files via a symlink attack on msg.conf in a directory identified by the CONFIGROOT environment variable, which returns the first line of the file in an error message. | ||||
CVE-2003-1061 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Race condition in Solaris 2.6 through 9 allows local users to cause a denial of service (kernel panic), as demonstrated via the namefs function, pipe, and certain STREAMS routines. | ||||
CVE-2003-1063 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
The patches (1) 105693-13, (2) 108800-02, (3) 105694-13, and (4) 108801-02 for cachefs on Solaris 2.6 and 7 overwrite the inetd.conf file, which may silently reenable services and allow remote attackers to bypass the intended security policy. | ||||
CVE-2003-1071 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header. | ||||
CVE-2003-1073 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
A race condition in the at command for Solaris 2.6 through 9 allows local users to delete arbitrary files via the -r argument with .. (dot dot) sequences in the job name, then modifying the directory structure after at checks permissions to delete the file and before the deletion actually takes place. | ||||
CVE-2003-1076 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Unknown vulnerability in sendmail for Solaris 7, 8, and 9 allows local users to cause a denial of service (unknown impact) and possibly gain privileges via certain constructs in a .forward file. | ||||
CVE-2003-1082 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Buffer overflow in utmp_update for Solaris 2.6 through 9 allows local users to gain root privileges, as identified by Sun BugID 4705891, a different vulnerability than CVE-2003-1068. | ||||
CVE-2005-1518 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Unknown vulnerability in Solaris 7 through 9, when using Federated Naming Services (FNS), autofs, and FNS X.500 configuration, allows local users to cause a denial of service (automountd crash) when "accessing" /xfn/_x500. | ||||
CVE-2003-1126 | 1 Sun | 1 One Web Server | 2025-04-03 | N/A |
Unknown vulnerability in SunOne/iPlanet Web Server SP3 through SP5 on Windows platforms allows remote attackers to cause a denial of service. | ||||
CVE-2003-1134 | 1 Sun | 1 Java | 2025-04-03 | N/A |
Sun Java 1.3.1, 1.4.1, and 1.4.2 allows local users to cause a denial of service (JVM crash), possibly by calling the ClassDepth function with a null parameter, which causes a crash instead of generating a null pointer exception. | ||||
CVE-2005-1105 | 1 Sun | 1 Javamail | 2025-04-03 | N/A |
Directory traversal vulnerability in the MimeBodyPart.getFileName method in JavaMail 1.3.2 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in the Content-Disposition header. | ||||
CVE-1999-0298 | 2 Slackware, Sun | 2 Slackware Linux, Sunos | 2025-04-03 | N/A |
ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack. | ||||
CVE-1999-0296 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Solaris volrmmount program allows attackers to read any file. | ||||
CVE-2005-3398 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers. | ||||
CVE-2006-3664 | 1 Sun | 2 Solaris, Sunos | 2025-04-03 | N/A |
Unspecified vulnerability in NIS server on Sun Solaris 8, 9, and 10 allows local and remote attackers to cause a denial of service (ypserv hang) via unknown vectors. | ||||
CVE-2003-1229 | 2 Oracle, Sun | 3 Jre, Java Web Start, Jsse | 2025-04-03 | N/A |
X509TrustManager in (1) Java Secure Socket Extension (JSSE) in SDK and JRE 1.4.0 through 1.4.0_01, (2) JSSE before 1.0.3, (3) Java Plug-in SDK and JRE 1.3.0 through 1.4.1, and (4) Java Web Start 1.0 through 1.2 incorrectly calls the isClientTrusted method when determining server trust, which results in improper validation of digital certificate and allows remote attackers to (1) falsely authenticate peers for SSL or (2) incorrectly validate signed JAR files. | ||||
CVE-2003-1516 | 1 Sun | 1 Java Plug-in | 2025-04-03 | N/A |
The org.apache.xalan.processor.XSLProcessorVersion class in Java Plug-in 1.4.2_01 allows signed and unsigned applets to share variables, which violates the Java security model and could allow remote attackers to read or write data belonging to a signed applet. | ||||
CVE-2003-1521 | 1 Sun | 1 Java Plug-in | 2025-04-03 | N/A |
Sun Java Plug-In 1.4 through 1.4.2_02 allows remote attackers to repeatedly access the floppy drive via the createXmlDocument method in the org.apache.crimson.tree.XmlDocument class, which violates the Java security model. |