Search
Search Results (27 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2009-2857 | 1 Oracle | 2 Opensolaris, Solaris | 2025-04-09 | 5.5 Medium |
| The kernel in Sun Solaris 8, 9, and 10, and OpenSolaris before snv_103, does not properly handle interaction between the filesystem and virtual-memory implementations, which allows local users to cause a denial of service (deadlock and system halt) via vectors involving mmap and write operations on the same file. | ||||
| CVE-2010-0916 | 1 Oracle | 1 Opensolaris | 2024-08-07 | N/A |
| Unspecified vulnerability in Oracle OpenSolaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to rdist. | ||||
| CVE-2010-0882 | 1 Oracle | 2 Opensolaris, Sun Products Suite | 2024-08-07 | N/A |
| Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite 10 and OpenSolaris snv_134 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Trusted Extensions. | ||||
| CVE-2010-0895 | 1 Oracle | 1 Opensolaris | 2024-08-07 | N/A |
| Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite OpenSolaris snv_119 allows local users to affect integrity and availability via unknown vectors related to IP Filter. | ||||
| CVE-2010-0889 | 1 Oracle | 1 Opensolaris | 2024-08-07 | N/A |
| Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite OpenSolaris snv_68 through snv_128 allows local users to affect confidentiality via unknown vectors related to the Kernel. | ||||
| CVE-2010-0890 | 1 Oracle | 2 Opensolaris, Sun Products Suite | 2024-08-07 | N/A |
| Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite 10 and OpenSolaris snv_01 through snv_98 allows local users to affect availability via unknown vectors related to the Kernel. | ||||
| CVE-2010-0083 | 1 Oracle | 1 Opensolaris | 2024-08-07 | N/A |
| Unspecified vulnerability in Oracle OpenSolaris 8, 9, and 10 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | ||||