The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Sun Solaris

Perl Archive-Tar: directory traversal via Symlink
An attacker can traverse directories via Symlink of Perl Archive::Tar, in order to create a file outside the service root path...
125523, bulletinjan2019, cpujul2020, CVE-2018-12015, DSA-2020-030, DSA-2020-289, DSA-4226-1, FEDORA-2018-10ae521efa, FEDORA-2018-4e088b6d7c, HT209600, NTAP-20180926-0001, NTAP-20180926-0002, NTAP-20180926-0003, NTAP-20180926-0004, NTAP-20180926-0005, NTAP-20180927-0001, openSUSE-SU-2018:2010-1, openSUSE-SU-2018:2011-1, RHSA-2019:2097-01, SUSE-SU-2018:1972-1, SUSE-SU-2018:1977-1, SUSE-SU-2018:1992-1, USN-3684-1, USN-3684-2, VIGILANCE-VUL-26351
Skia: buffer overflow via SVG Rasterizing
An attacker can generate a buffer overflow via SVG Rasterizing of Skia, in order to trigger a denial of service, and possibly to run code...
bulletinjul2018, CERTFR-2018-AVI-271, CVE-2018-6126, DSA-4220-1, DSA-4237-1, FEDORA-2018-09b59b0227, FEDORA-2018-7c80aaef26, FEDORA-2019-7f7489dc8c, MFSA-2018-14, openSUSE-SU-2018:1616-1, openSUSE-SU-2018:2054-1, openSUSE-SU-2018:2055-1, RHSA-2018:1815-01, RHSA-2018:2112-01, RHSA-2018:2113-01, SSA:2018-157-01, SSA:2019-247-01, SUSE-SU-2018:1783-1, SUSE-SU-2018:1820-1, SUSE-SU-2018:2298-1, USN-3682-1, VIGILANCE-VUL-26331
libvorbis: buffer overflow via mapping0_forward
An attacker can generate a buffer overflow via mapping0_forward() of libvorbis, in order to trigger a denial of service, and possibly to run code...
bulletinjul2018, CVE-2018-10392, DLA-2013-1, FEDORA-2018-0259281ab6, FEDORA-2019-2e385f97e2, openSUSE-SU-2018:1622-1, openSUSE-SU-2018:1953-1, RHSA-2019:3703-01, SUSE-SU-2018:1563-1, SUSE-SU-2018:1565-1, SUSE-SU-2018:1885-1, VIGILANCE-VUL-26326
git: information disclosure via NTFS Path Sanity-checks
A local attacker can read a memory fragment via NTFS Path Sanity-checks of git, in order to obtain sensitive information...
bulletinjul2018, CVE-2018-11233, FEDORA-2018-080a3d7866, FEDORA-2018-75f7624a9f, JSA11023, openSUSE-SU-2018:1553-1, openSUSE-SU-2020:0598-1, RHSA-2018:2147-01, SSA:2018-152-01, SUSE-SU-2018:1566-1, SUSE-SU-2018:1872-1, SUSE-SU-2020:1121-1, USN-3671-1, VIGILANCE-VUL-26300
Oslo middleware: information disclosure
An attacker can bypass access restrictions to data of Oslo middleware, in order to obtain sensitive information...
bulletinjul2018, CVE-2017-2592, USN-3666-1, VIGILANCE-VUL-26292
git: code execution via gitmodules
An attacker can use a vulnerability via gitmodules of git, in order to run code...
bulletinjul2018, CERTFR-2018-AVI-263, CVE-2018-11235, DSA-4212-1, FEDORA-2018-080a3d7866, FEDORA-2018-75f7624a9f, FEDORA-2018-94eb743dad, FEDORA-2018-b10e54263a, JSA11023, openSUSE-SU-2018:1553-1, openSUSE-SU-2018:2502-1, openSUSE-SU-2018:3519-1, openSUSE-SU-2020:0598-1, RHSA-2018:1957-01, RHSA-2018:2147-01, SSA:2018-152-01, SUSE-SU-2018:1566-1, SUSE-SU-2018:1872-1, SUSE-SU-2018:2469-1, SUSE-SU-2018:3440-1, SUSE-SU-2020:1121-1, USN-3671-1, VIGILANCE-VUL-26260
Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
bulletinapr2018, CERTFR-2018-AVI-251, CVE-2018-11354, CVE-2018-11355, CVE-2018-11356, CVE-2018-11357, CVE-2018-11358, CVE-2018-11359, CVE-2018-11360, CVE-2018-11361, CVE-2018-11362, DLA-1388-1, DLA-1634-1, DSA-4217-1, FEDORA-2018-3dfee621af, FEDORA-2018-d1cfa444d2, openSUSE-SU-2018:1428-1, openSUSE-SU-2020:0362-1, RHSA-2020:1047-01, SUSE-SU-2018:1988-1, SUSE-SU-2018:2412-1, SUSE-SU-2018:2891-1, VIGILANCE-VUL-26204, wnpa-sec-2018-25, wnpa-sec-2018-26, wnpa-sec-2018-27, wnpa-sec-2018-28, wnpa-sec-2018-29, wnpa-sec-2018-30, wnpa-sec-2018-31, wnpa-sec-2018-32, wnpa-sec-2018-33
Python: denial of service via I/O Stream Concurrence
An attacker can generate a fatal error via I/O Stream Concurrence of Python, in order to trigger a denial of service...
bulletinjan2019, CVE-2018-1000030, openSUSE-SU-2018:1415-1, SUSE-SU-2018:1372-1, SUSE-SU-2020:0234-1, USN-3817-1, USN-3817-2, VIGILANCE-VUL-26198
procps: multiple vulnerabilities
An attacker can use several vulnerabilities of procps...
CVE-2018-1122, CVE-2018-1123, CVE-2018-1124, CVE-2018-1125, CVE-2018-1126, DLA-1390-1, DSA-2020-030, DSA-2020-289, DSA-4208-1, FEDORA-2018-bba8fed5ab, FEDORA-2018-de5de06754, JSA10917, K00409335, K16124204, K83271321, openSUSE-SU-2018:1848-1, openSUSE-SU-2019:0291-1, openSUSE-SU-2019:2376-1, openSUSE-SU-2019:2379-1, RHSA-2018:1700-01, RHSA-2018:1777-01, RHSA-2018:2267-01, RHSA-2018:2268-01, RHSA-2019:1944-01, RHSA-2019:2189-01, RHSA-2019:2401-01, RHSA-2020:0595-01, RHSA-2020:1265-01, RHSA-2020:1464-01, SB10241, SSA:2018-142-03, SUSE-SU-2018:1836-1, SUSE-SU-2018:2042-1, SUSE-SU-2018:2451-2, SUSE-SU-2019:0450-1, SUSE-SU-2019:2730-1, Synology-SA-18:51, USN-3658-1, USN-3658-2, USN-3658-3, VIGILANCE-VUL-26197
Processors: information disclosure via Speculative Store
A local attacker can read a memory fragment via Speculative Store of some processors, in order to obtain sensitive information...
1528, 18-0006, 525441, ADV180012, CERTFR-2018-AVI-248, CERTFR-2018-AVI-250, CERTFR-2018-AVI-256, CERTFR-2018-AVI-258, CERTFR-2018-AVI-259, CERTFR-2018-AVI-280, CERTFR-2018-AVI-306, CERTFR-2018-AVI-308, CERTFR-2018-AVI-319, CERTFR-2018-AVI-330, CERTFR-2018-AVI-346, CERTFR-2018-AVI-357, CERTFR-2018-AVI-386, CERTFR-2018-AVI-429, CERTFR-2019-AVI-036, CERTFR-2019-AVI-052, CERTFR-2019-AVI-489, CERTFR-2020-AVI-548, CERTFR-2020-AVI-568, cisco-sa-20180521-cpusidechannel, cpujan2019, cpujul2020, CTX235225, CVE-2018-3639, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1446-1, DLA-1506-1, DLA-1529-1, DLA-1731-1, DLA-1731-2, DSA-2018-175, DSA-2019-030, DSA-4210-1, DSA-4273-1, DSA-4273-2, FEDORA-2018-5521156807, FEDORA-2018-6367a17aa3, FEDORA-2018-aec846c0ef, FEDORA-2018-db0d3e157e, FG-IR-18-002, HPESBHF03850, HT209139, HT209193, ibm10796076, JSA10917, JSA11023, K29146534, K54252492, N1022433, nas8N1022433, openSUSE-SU-2018:1380-1, openSUSE-SU-2018:1418-1, openSUSE-SU-2018:1420-1, openSUSE-SU-2018:1487-1, openSUSE-SU-2018:1621-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:1628-1, openSUSE-SU-2018:1773-1, openSUSE-SU-2018:1904-1, openSUSE-SU-2018:2306-1, openSUSE-SU-2018:2399-1, openSUSE-SU-2018:2402-1, openSUSE-SU-2018:3103-1, openSUSE-SU-2018:3709-1, openSUSE-SU-2019:0042-1, openSUSE-SU-2019:1438-1, openSUSE-SU-2019:1439-1, openSUSE-SU-2020:1325-1, RHSA-2018:1629-01, RHSA-2018:1630-01, RHSA-2018:1632-01, RHSA-2018:1633-01, RHSA-2018:1635-01, RHSA-2018:1636-01, RHSA-2018:1637-01, RHSA-2018:1638-01, RHSA-2018:1639-01, RHSA-2018:1640-01, RHSA-2018:1641-01, RHSA-2018:1642-01, RHSA-2018:1647-01, RHSA-2018:1648-01, RHSA-2018:1649-01, RHSA-2018:1650-01, RHSA-2018:1651-01, RHSA-2018:1652-01, RHSA-2018:1653-01, RHSA-2018:1656-01, RHSA-2018:1657-01, RHSA-2018:1658-01, RHSA-2018:1659-01, RHSA-2018:1660-01, RHSA-2018:1661-01, RHSA-2018:1662-01, RHSA-2018:1663-01, RHSA-2018:1664-01, RHSA-2018:1665-01, RHSA-2018:1666-01, RHSA-2018:1667-01, RHSA-2018:1668-01, RHSA-2018:1669-01, RHSA-2018:1737-01, RHSA-2018:1738-01, RHSA-2018:1826-01, RHSA-2018:1965-01, RHSA-2018:1967-01, RHSA-2018:1997-01, RHSA-2018:2001-01, RHSA-2018:2003-01, RHSA-2018:2006-01, RHSA-2018:2161-01, RHSA-2018:2162-01, RHSA-2018:2164-01, RHSA-2018:2171-01, RHSA-2018:2172-01, RHSA-2018:2216-01, RHSA-2018:2250-01, RHSA-2018:2309-01, RHSA-2018:2384-01, RHSA-2018:2387-01, RHSA-2018:2390-01, RHSA-2018:2394-01, RHSA-2018:2395-01, RHSA-2018:2396-01, RHSA-2018:2948-01, RHSA-2018:3396-01, RHSA-2018:3397-01, RHSA-2018:3398-01, RHSA-2018:3399-01, RHSA-2018:3400-01, RHSA-2018:3401-01, RHSA-2018:3402-01, RHSA-2018:3407-01, RHSA-2018:3423-01, RHSA-2018:3424-01, RHSA-2018:3425-01, spectre_meltdown_advisory, SSA:2018-208-01, SSA-268644, SSA-505225, SSA-608355, SUSE-SU-2018:1362-1, SUSE-SU-2018:1363-1, SUSE-SU-2018:1366-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1374-1, SUSE-SU-2018:1375-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1377-1, SUSE-SU-2018:1378-1, SUSE-SU-2018:1386-1, SUSE-SU-2018:1389-1, SUSE-SU-2018:1452-1, SUSE-SU-2018:1456-1, SUSE-SU-2018:1475-1, SUSE-SU-2018:1479-1, SUSE-SU-2018:1482-1, SUSE-SU-2018:1582-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1614-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:1816-1, SUSE-SU-2018:1846-1, SUSE-SU-2018:1926-1, SUSE-SU-2018:1935-1, SUSE-SU-2018:2076-1, SUSE-SU-2018:2082-1, SUSE-SU-2018:2141-1, SUSE-SU-2018:2304-1, SUSE-SU-2018:2331-1, SUSE-SU-2018:2335-1, SUSE-SU-2018:2338-1, SUSE-SU-2018:2340-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2556-1, SUSE-SU-2018:2565-1, SUSE-SU-2018:2615-1, SUSE-SU-2018:2650-1, SUSE-SU-2018:2973-1, SUSE-SU-2018:3064-1, SUSE-SU-2018:3064-3, SUSE-SU-2018:3555-1, SUSE-SU-2019:0049-1, SUSE-SU-2019:0148-1, SUSE-SU-2019:1211-2, SUSE-SU-2019:2028-1, SUSE-SU-2020:2540-1, SUSE-SU-2020:2605-1, TA18-141A, USN-3651-1, USN-3652-1, USN-3653-1, USN-3653-2, USN-3654-1, USN-3654-2, USN-3655-1, USN-3655-2, USN-3679-1, USN-3680-1, USN-3756-1, VIGILANCE-VUL-26183, VMSA-2018-0012, VMSA-2018-0012.1, VU#180049, XSA-263
Our database contains other pages. You can request a free trial to read them.

Display information about Sun Solaris: