Vulnerabilities of SunOSSunOS vulnerability: authenticating by changing time
A local attacker, who previously used Sudo, can change the system time, in order to use Sudo without authenticating.SunOS vulnerability: denial of service via enum_recv
An authenticated attacker can call enum_recv, in order to read the memory of PostgreSQL, or to stop it.SunOS vulnerability: code execution via brackets
When an attacker can control the parameter of the maketext() method of the Perl Locale::Maketext module, he can inject Perl code, which is executed.SunOS vulnerability: denial of service via SSL and NIO
An attacker who access Tomcat using the NIO connector and an SSL enabled connection, can cause excessive computing power, in order to deny service.SunOS vulnerability: bypassing the DIGEST authentication
When Apache Tomcat uses an HTTP DIGEST authentication, an attacker can replay a previously captured session, and thus access to protected resources.Display other vulnerabilities of SunOS described by Vigil@nce...
Display information about SunOS: