The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Solaris

2 Poppler: out-of-bounds memory reading via pdfunite
An attacker can force a read at an invalid address via pdfunite() of Poppler, in order to trigger a denial of service, or to obtain sensitive information...
bulletinjan2019, CVE-2018-13988, DLA-1562-1, DLA-1562-2, DLA-1562-3, FEDORA-2018-c8c7d35b83, RHSA-2018:3140-01, USN-3757-1, VIGILANCE-VUL-26882
2 libsndfile: buffer overflow via psf_memset
An attacker can generate a buffer overflow via psf_memset() of libsndfile, in order to trigger a denial of service, and possibly to run code...
397, bulletinoct2018, CVE-2018-13139, DLA-1618-1, openSUSE-SU-2018:2209-1, openSUSE-SU-2018:2214-1, SUSE-SU-2018:2065-1, SUSE-SU-2018:2074-1, USN-4013-1, VIGILANCE-VUL-26854
3 Mutt: multiple vulnerabilities
An attacker can use several vulnerabilities of Mutt...
CVE-2018-14349, CVE-2018-14350, CVE-2018-14351, CVE-2018-14352, CVE-2018-14353, CVE-2018-14354, CVE-2018-14355, CVE-2018-14356, CVE-2018-14357, CVE-2018-14358, CVE-2018-14359, CVE-2018-14360, CVE-2018-14361, CVE-2018-14362, CVE-2018-14363, DLA-1455-1, DSA-4277-1, openSUSE-SU-2018:2212-1, openSUSE-SU-2019:0052-1, RHSA-2018:2526-01, SUSE-SU-2018:2084-1, SUSE-SU-2018:2085-1, SUSE-SU-2018:2403-1, SUSE-SU-2019:1196-1, USN-3719-1, USN-3719-2, USN-3719-3, VIGILANCE-VUL-26822
2 libxml2: NULL pointer dereference via xpath.c-xmlXPathCompOpEval
An attacker can force a NULL pointer to be dereferenced via xpath.c:xmlXPathCompOpEval() of libxml2, in order to trigger a denial of service...
901817, bulletinapr2019, CVE-2018-14404, DLA-1524-1, openSUSE-SU-2018:3107-1, openSUSE-SU-2018:3110-1, openSUSE-SU-2019:0185-1, SSB-439005, SUSE-SU-2018:3080-1, SUSE-SU-2018:3081-1, SUSE-SU-2019:0272-1, SUSE-SU-2019:13985-1, USN-3739-1, USN-3739-2, VIGILANCE-VUL-26812
2 Mercurial: memory corruption via mpatch_decode
An attacker can generate a memory corruption via mpatch_decode of Mercurial, in order to trigger a denial of service, and possibly to run code...
bulletinjan2019, CVE-2018-13348, openSUSE-SU-2018:2023-1, openSUSE-SU-2018:2132-1, SUSE-SU-2018:1990-1, SUSE-SU-2018:1996-1, SUSE-SU-2018:1998-1, VIGILANCE-VUL-26807
2 Mercurial: memory corruption via mpatch_apply
An attacker can generate a memory corruption via mpatch_apply() of Mercurial, in order to trigger a denial of service, and possibly to run code...
bulletinjan2019, CVE-2018-13346, openSUSE-SU-2018:2023-1, openSUSE-SU-2018:2132-1, RHSA-2019:2276-01, SUSE-SU-2018:1990-1, SUSE-SU-2018:1996-1, SUSE-SU-2018:1998-1, VIGILANCE-VUL-26805
2 PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
bulletinoct2018, CERTFR-2018-AVI-355, CVE-2018-14851, CVE-2018-14883, CVE-2018-15132, DLA-1490-1, DSA-4353-1, FEDORA-2018-6f37f99641, FEDORA-2018-9438795217, openSUSE-SU-2018:2405-1, openSUSE-SU-2018:2694-1, RHSA-2019:2519-01, SSA:2018-201-01, SUSE-SU-2018:2333-1, SUSE-SU-2018:2337-1, SUSE-SU-2018:2681-1, SUSE-SU-2018:2682-1, USN-3766-1, USN-3766-2, VIGILANCE-VUL-26804
2 Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
bulletinjul2018, CERTFR-2018-AVI-354, CVE-2018-14339, CVE-2018-14340, CVE-2018-14341, CVE-2018-14342, CVE-2018-14343, CVE-2018-14344, CVE-2018-14364, CVE-2018-14367, CVE-2018-14368, CVE-2018-14369, CVE-2018-14370, DLA-1451-1, FEDORA-2018-9ef52861b5, FEDORA-2018-d56c428f9e, openSUSE-SU-2018:2184-1, openSUSE-SU-2018:2188-1, SUSE-SU-2018:2301-1, SUSE-SU-2018:2412-1, SUSE-SU-2018:2891-1, VIGILANCE-VUL-26799, wnpa-sec-2018-34, wnpa-sec-2018-35, wnpa-sec-2018-36, wnpa-sec-2018-37, wnpa-sec-2018-38, wnpa-sec-2018-39, wnpa-sec-2018-40, wnpa-sec-2018-41, wnpa-sec-2018-42, wnpa-sec-2018-43
2 Apache httpd: NULL pointer dereference via mod_md
An attacker can force a NULL pointer to be dereferenced via mod_md of Apache httpd, in order to trigger a denial of service...
bulletinjul2018, CVE-2018-8011, FEDORA-2018-49d3b42425, ibm10720141, openSUSE-SU-2018:2433-1, SSA:2018-199-01, SUSE-SU-2018:2424-1, VIGILANCE-VUL-26781
2 Git: code execution via Input Validation Error
An attacker can use a vulnerability via Input Validation Error of Git, in order to run code...
bulletinjul2018, CVE-2018-1000021, VIGILANCE-VUL-26771
Our database contains other pages. You can request a free trial to read them.

Display information about Solaris: