Filtered by vendor Sun
Subscribe
Total
1705 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-6481 | 1 Sun | 1 Sunos | 2016-12-06 | 4.3 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 10 and 11 allows remote attackers to affect confidentiality via vectors related to KSSL. | |||||
CVE-2014-6509 | 1 Sun | 1 Sunos | 2016-12-06 | 4.9 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability via unknown vectors related to Kernel. | |||||
CVE-2011-0813 | 1 Sun | 1 Sunos | 2016-11-28 | 4.9 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel, a different vulnerability than CVE-2012-0098. | |||||
CVE-2005-1232 | 1 Sun | 1 Java System Web Proxy Server | 2016-11-28 | 7.5 HIGH | N/A |
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors. | |||||
CVE-2011-2313 | 2 Oracle, Sun | 2 Solaris, Sunos | 2016-11-22 | 4.3 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability, related to ZFS, a different vulnerability than CVE-2011-2311. | |||||
CVE-2014-0447 | 2 Oracle, Sun | 2 Sunos, Sunos | 2016-11-22 | 4.9 MEDIUM | N/A |
Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows local users to affect availability via unknown vectors related to Kernel, a different vulnerability than CVE-2013-5876. | |||||
CVE-2005-3583 | 1 Sun | 2 Jre, Sdk | 2016-10-17 | 7.8 HIGH | N/A |
(1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.2_08, 1.4.2_09, and 1.5.0_05 and possibly other versions allow remote attackers to cause a denial of service (JVM unresponsive) via a crafted serialized object, such as a font object as demonstrated on JBoss. | |||||
CVE-2005-2071 | 1 Sun | 1 Solaris | 2016-10-17 | 4.6 MEDIUM | N/A |
traceroute in Sun Solaris 10 on x86 systems allows local users to execute arbitrary code with PRIV_NET_RAWACCESS privileges via (1) a large number of -g arguments or (2) a malformed -s argument with a trailing . (dot). | |||||
CVE-2005-1973 | 1 Sun | 1 J2se | 2016-10-17 | 5.1 MEDIUM | N/A |
Java Web Start in Java 2 Platform Standard Edition (J2SE) 5.0 and 5.0 Update 1 allows applications to assign permissions to themselves and gain privileges. | |||||
CVE-2005-1974 | 1 Sun | 1 J2se | 2016-10-17 | 5.1 MEDIUM | N/A |
Unspecified vulnerability in Java 2 Platform, Standard Edition (J2SE) 5.0 and 5.0 Update 1 and J2SE 1.4.2 up to 1.4.2_07, as used in multiple products and platforms including (1) HP-UX and (2) APC PowerChute, allows applications to assign permissions to themselves and gain privileges. | |||||
CVE-2005-1753 | 1 Sun | 1 Javamail | 2016-10-17 | 5.0 MEDIUM | N/A |
** DISPUTED ** ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products." | |||||
CVE-2005-1754 | 2 Apache Tomcat, Sun | 2 Apache Tomcat, Javamail | 2016-10-17 | 5.0 MEDIUM | N/A |
** DISPUTED ** JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products." | |||||
CVE-2005-1105 | 1 Sun | 1 Javamail | 2016-10-17 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the MimeBodyPart.getFileName method in JavaMail 1.3.2 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in the Content-Disposition header. | |||||
CVE-2005-0836 | 1 Sun | 1 J2se | 2016-10-17 | 10.0 HIGH | N/A |
Argument injection vulnerability in Java Web Start for J2SE 1.4.2 up to 1.4.2_06 allows untrusted applications to gain privileges via the value parameter of a property tag in a JNLP file. | |||||
CVE-2005-0548 | 1 Sun | 1 Solaris Answerbook2 | 2016-10-17 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search function. | |||||
CVE-2005-0549 | 1 Sun | 1 Solaris Answerbook2 | 2016-10-17 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the "View Log Files" function. | |||||
CVE-2005-0223 | 2 Compaq, Sun | 3 Tru64, Rte, Sdk | 2016-10-17 | 5.0 MEDIUM | N/A |
The Software Development Kit (SDK) and Run Time Environment (RTE) 1.4.1 and 1.4.2 for Tru64 UNIX allows remote attackers to cause a denial of service (Java Virtual Machine hang) via object deserialization. | |||||
CVE-2003-0896 | 1 Sun | 1 Jre | 2016-10-17 | 7.5 HIGH | N/A |
The loadClass method of the sun.applet.AppletClassLoader class in the Java Virtual Machine (JVM) in Sun SDK and JRE 1.4.1_03 and earlier allows remote attackers to bypass sandbox restrictions and execute arbitrary code via a loaded class name that contains "/" (slash) instead of "." (dot) characters, which bypasses a call to the Security Manager's checkPackageAccess method. | |||||
CVE-2003-0676 | 1 Sun | 2 Iplanet Directory Server, One Directory Server | 2016-10-17 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in ViewLog for iPlanet Administration Server 5.1 (aka Sun ONE) allows remote attackers to read arbitrary files via "..%2f" (partially encoded dot dot) sequences. | |||||
CVE-2003-0413 | 1 Sun | 1 One Application Server | 2016-10-17 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the webapps-simple sample application for (1) Sun ONE Application Server 7.0 for Windows 2000/XP or (2) Sun Java System Web Server 6.1 allows remote attackers to insert arbitrary web script or HTML via an HTTP request that generates an "Invalid JSP file" error, which inserts the text in the resulting error message. |