This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sun First view 1989-07-26
Product Sunos Last view 2015-01-21
Version 5.10 Type
Update  
Edition sparc  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:* 222
cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:* 156
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:* 152
cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:* 135
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:* 120
cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:* 120
cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:* 91
cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:* 90
cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:* 88
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:* 82
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:* 63
cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:* 38
cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:* 36
cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:* 35
cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:* 35
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:* 31
cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:* 30
cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:* 30
cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:* 27
cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:* 26
cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:* 26
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:* 25
cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:* 23
cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:* 23
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:* 23
cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:* 22
cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:* 22
cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:* 21
cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:* 20
cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:* 18
cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:* 17
cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:* 17
cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:* 14
cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:* 13
cpe:2.3:o:sun:sunos:4.1.3a1:*:*:*:*:*:*:* 13
cpe:2.3:o:sun:sunos:5.6:*:x86:*:*:*:*:* 10
cpe:2.3:o:sun:sunos:5.8:*:x86:*:*:*:*:* 10
cpe:2.3:o:sun:sunos:5.7:*:x86:*:*:*:*:* 10
cpe:2.3:o:sun:sunos:5.10:-:*:*:*:*:amd64:* 3
cpe:2.3:o:sun:sunos:5.10:-:sparc:*:*:*:*:* 3
cpe:2.3:o:sun:sunos:5.11:-:*:*:*:*:amd64:* 2
cpe:2.3:o:sun:sunos:5.11:-:*:*:*:*:x86:* 2

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
1.9 2015-01-21 CVE-2015-0430

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality via vectors related to RPC Utility.

3.3 2015-01-21 CVE-2015-0429

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to RPC Utility.

4.9 2015-01-21 CVE-2015-0428

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Resource Control.

2.1 2015-01-21 CVE-2015-0397

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2014-6600.

5 2015-01-21 CVE-2015-0375

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect confidentiality via unknown vectors related to Network.

4.9 2015-01-21 CVE-2014-6600

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2015-0397.

5 2015-01-21 CVE-2014-6575

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via unknown vectors related to Network, a different vulnerability than CVE-2004-0230.

4.9 2015-01-21 CVE-2014-6570

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6600 and CVE-2015-0397.

7.2 2015-01-21 CVE-2014-6524

Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel.

7.2 2015-01-21 CVE-2014-6521

Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via vectors related to CDE - Power Management Utility.

6.6 2015-01-21 CVE-2014-6518

Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to Unix File System (UFS).

7.2 2015-01-21 CVE-2014-6510

Unspecified vulnerability in Oracle Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Power Management Utility.

4.9 2015-01-21 CVE-2014-6509

Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability via unknown vectors related to Kernel.

4.3 2015-01-21 CVE-2014-6481

Unspecified vulnerability in Oracle Solaris 10 and 11 allows remote attackers to affect confidentiality via vectors related to KSSL.

6.8 2014-10-15 CVE-2014-6529

Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hermon HCA PCIe driver.

7.8 2014-10-15 CVE-2014-6508

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via vectors related to iSCSI Data Mover (IDM).

2.1 2014-10-15 CVE-2014-6501

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality via vectors related to SSH.

4.9 2014-10-15 CVE-2014-6497

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Kernel.

5 2014-10-15 CVE-2014-6490

Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect availability via vectors related to SMB server user component.

7.2 2014-10-15 CVE-2014-6473

Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Zone Framework.

6.8 2014-10-15 CVE-2014-6470

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Archive Utility.

4.4 2014-10-15 CVE-2014-4284

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to IPS transfer module, a different vulnerability than CVE-2014-4280.

4.3 2014-10-15 CVE-2014-4283

Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect confidentiality via unknown vectors related to Automated Install Engine, a different vulnerability than CVE-2014-4277.

7.2 2014-10-15 CVE-2014-4282

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to Kernel/X86.

4.6 2014-10-15 CVE-2014-4280

Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to IPS transfer module, a different vulnerability than CVE-2014-4284.

CWE : Common Weakness Enumeration

%idName
26% (12) CWE-264 Permissions, Privileges, and Access Controls
17% (8) CWE-399 Resource Management Errors
15% (7) CWE-189 Numeric Errors
10% (5) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (4) CWE-16 Configuration
4% (2) CWE-362 Race Condition
4% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
4% (2) CWE-20 Improper Input Validation
2% (1) CWE-255 Credentials Management
2% (1) CWE-200 Information Exposure
2% (1) CWE-134 Uncontrolled Format String
2% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-2 Inducing Account Lockout
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-26 Leveraging Race Conditions
CAPEC-27 Leveraging Race Conditions via Symbolic Links
CAPEC-38 Leveraging/Manipulating Configuration File Search Paths
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-42 MIME Conversion
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-58 Restful Privilege Elevation
CAPEC-67 String Format Overflow in syslog()
CAPEC-68 Subvert Code-signing Facilities
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-88 OS Command Injection
CAPEC-92 Forced Integer Overflow
CAPEC-96 Block Access to Libraries
CAPEC-100 Overflow Buffers
CAPEC-123 Buffer Attacks
CAPEC-128 Integer Attacks

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:6051 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5833 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5966 Security vulnerability in the BIND executable
oval:org.mitre.oval:def:5579 A TCP SYN packet with target host's address as both source and destination ca...
oval:org.mitre.oval:def:5931 The vacation program erroneously passes parameters to sendmail.
oval:org.mitre.oval:def:5743 A TCP SYN packet with target host's address as both source and destination ca...
oval:org.mitre.oval:def:6076 automountd can run user programs as root.
oval:org.mitre.oval:def:5571 ttsession uses weak RPC authentication mechanism
oval:org.mitre.oval:def:1880 CDE dtspcd Daemon Symlink Vulnerability
oval:org.mitre.oval:def:3078 CDE AddSuLog Function Buffer Overflow
oval:org.mitre.oval:def:5482 Buffer overflow vulnerability in the CDE Calendar Manager Service Daemon, rpc...
oval:org.mitre.oval:def:1470 Alternate ps Command Information Disclosure Vulnerability
oval:org.mitre.oval:def:555 Xsun Buffer Overflow via HOME Envvar
oval:org.mitre.oval:def:1828 Buffer Overflow in "in.telnetd"or "telnetd"Process
oval:org.mitre.oval:def:7 Solaris 8 kcms_configure Command-Line Buffer Overflow
oval:org.mitre.oval:def:65 Solaris 7 kcms_configure Command-Line Buffer Overflow
oval:org.mitre.oval:def:131 Heap Overflow in Solaris 7 xlock
oval:org.mitre.oval:def:10 Heap Overflow in Solaris 8 xlock
oval:org.mitre.oval:def:56 Solaris 8 rpc.yppasswdd Buffer Overrun Vulnerability
oval:org.mitre.oval:def:102 Solaris 7 rpc.yppasswdd Buffer Overrun Vulnerability
oval:org.mitre.oval:def:2025 System V login Buffer Overflow
oval:org.mitre.oval:def:47 Solaris 8 whodo Buffer Overflow Vulnerability
oval:org.mitre.oval:def:34 Solaris 7 whodo Buffer Overflow Vulnerability
oval:org.mitre.oval:def:1844 ypbind Daemon Buffer Overflow
oval:org.mitre.oval:def:31 Solaris 8/9 cachefsd Heap Overflow Vulnerability

SAINT Exploits

Description Link
SSH password weakness More info here
cachefsd heap overflow More info here
Samba call_trans2open buffer overflow More info here
Solaris loadable kernel module directory traversal More info here
Solaris telnetd authentication bypass More info here
System V login argument array buffer overflow More info here
snmpXdmid buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78427 Oracle Solaris Kernel Component Unspecified Local DoS (2012-0098)
78426 Oracle Solaris ksh93 Shell Component Unspecified Local Information Disclosure
78425 Oracle Solaris sshd Component Unspecified Remote DoS
78424 Oracle Solaris TCP/IP Component Unspecified Local Issue
78423 Oracle Solaris Kernel Component Unspecified Local DoS (2012-0103)
78422 Oracle Solaris Network Component Unspecified Remote DoS
78421 Oracle Solaris Kerberos Component Unspecified Local Privilege Escalation
78420 Oracle Solaris TCP/IP Component Unspecified Remote DoS
76475 Oracle Solaris iSCSI DataMover(IDM) Component Unspecified Local DoS
76474 Oracle Solaris Kernel/Performance Counter BackEnd Module (pcbe) Component Uns...
76468 Oracle Solaris Process File System (procfs) Component Unspecified Local Issue
76467 Oracle Solaris LDAP Library Component Unspecified Remote Issue
76466 Oracle Solaris ZFS Component Unspecified Local DoS (2011-2313)
73968 Oracle Solaris Trusted Extensions Unspecified Local Information Disclosure
73967 Oracle Solaris LiveUpgrade Unspecified Local Issue
73966 Oracle Solaris rksh Unspecified Local Issue
73965 Oracle Solaris Driver/USB Unspecified Local DoS
73964 Oracle Solaris Zones Unspecified Local DoS
73963 Oracle Solaris UFS Unspecified Local DoS
73962 Oracle Solaris Kernel/sockfs Unspecified Local DoS
73961 Oracle Solaris Kernel/SCTP Unspecified Local DoS
73960 Oracle Solaris KSSL Unspecified Remote DoS
73959 Oracle Solaris SSH Unspecified Remote DoS
73958 Oracle Solaris TCP/IP Unspecified Remote DoS
73957 Oracle Solaris Installer Unspecified Local Issue

ExploitDB Exploits

id Description
25389 Multiple Vendor ICMP Message Handling DoS
25388 Multiple Vendor ICMP Implementation Malformed Path MTU DoS
25387 Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS
24450 FreeBSD 9.1 ftpd Remote Denial of Service
23765 Sun Solaris 8/9 Unspecified Passwd Local Root Compromise Vulnerability
21180 Solaris/SPARC 2.5.1/2.6/7/8 Derived 'login' Buffer Overflow Vulnerability
16137 Multiple Vendor Calendar Manager Remote Code Execution
15215 Multiple Vendors libc/glob(3) Resource Exhaustion (+0day remote ftpd-anon)
5227 Solaris 8/9/10 - fifofs I_PEEK Local Kernel Memory Leak Exploit
1182 Solaris 2.6/7/8/9 (ld.so.1) Local Root Exploit (sparc)
948 Multiple OS (Win32/Aix/Cisco) - Crafted ICMP Messages DoS Exploit
716 Solaris 2.5.1/2.6/7/8 rlogin /bin/login - Buffer Overflow Exploit (SPARC)
715 Solaris 8/9 passwd circ() Local Root Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2013-09-18 Name : Debian Security Advisory DSA 2590-1 (wireshark - several vulnerabilities)
File : nvt/deb_2590_1.nasl
2012-12-28 Name : Wireshark GSM RLC MAC dissector Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_wireshark_gsm_rlcmac_bof_macosx.nasl
2012-12-28 Name : Wireshark Multiple Vulnerabilities-01 Dec 2012 (Mac OS X)
File : nvt/gb_wireshark_mult_vuln01_dec12_macosx.nasl
2012-12-28 Name : Wireshark Multiple Vulnerabilities-02 Dec 2012 (Mac OS X)
File : nvt/gb_wireshark_mult_vuln02_dec12_macosx.nasl
2012-12-18 Name : Fedora Update for xen FEDORA-2012-19828
File : nvt/gb_fedora_2012_19828_xen_fc16.nasl
2012-12-14 Name : Fedora Update for xen FEDORA-2012-19717
File : nvt/gb_fedora_2012_19717_xen_fc17.nasl
2012-12-13 Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen)
File : nvt/gb_suse_2012_0886_1.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18242
File : nvt/gb_fedora_2012_18242_xen_fc17.nasl
2012-11-23 Name : Fedora Update for xen FEDORA-2012-18249
File : nvt/gb_fedora_2012_18249_xen_fc16.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17204
File : nvt/gb_fedora_2012_17204_xen_fc17.nasl
2012-11-15 Name : Fedora Update for xen FEDORA-2012-17408
File : nvt/gb_fedora_2012_17408_xen_fc16.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13434
File : nvt/gb_fedora_2012_13434_xen_fc17.nasl
2012-09-22 Name : Fedora Update for xen FEDORA-2012-13443
File : nvt/gb_fedora_2012_13443_xen_fc16.nasl
2012-08-30 Name : FreeBSD Ports: wireshark
File : nvt/freebsd_wireshark7.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11182
File : nvt/gb_fedora_2012_11182_xen_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-11755
File : nvt/gb_fedora_2012_11755_xen_fc17.nasl
2012-08-30 Name : Fedora Update for wireshark FEDORA-2012-12085
File : nvt/gb_fedora_2012_12085_wireshark_fc16.nasl
2012-08-30 Name : Fedora Update for wireshark FEDORA-2012-12091
File : nvt/gb_fedora_2012_12091_wireshark_fc17.nasl
2012-08-30 Name : Fedora Update for xen FEDORA-2012-9386
File : nvt/gb_fedora_2012_9386_xen_fc17.nasl
2012-08-24 Name : Fedora Update for xen FEDORA-2012-11785
File : nvt/gb_fedora_2012_11785_xen_fc16.nasl
2012-08-21 Name : Wireshark GSM RLC MAC dissector Buffer Overflow Vulnerability (Windows)
File : nvt/gb_wireshark_dissect_gsm_rlcmac_downlink_bof_win.nasl
2012-08-21 Name : Wireshark Multiple Vulnerabilities(01) - August 2012 (Windows)
File : nvt/gb_wireshark_mult_vuln01_aug12_win.nasl
2012-08-21 Name : Wireshark Multiple Vulnerabilities - August 2012 (Windows)
File : nvt/gb_wireshark_mult_vuln_aug12_win.nasl
2012-08-17 Name : Mandriva Update for wireshark MDVSA-2012:134 (wireshark)
File : nvt/gb_mandriva_MDVSA_2012_134.nasl
2012-08-10 Name : Debian Security Advisory DSA 2501-1 (xen)
File : nvt/deb_2501_1.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0107 Multiple Vulnerabilities in Oracle & Sun Systems Products Suite
Severity: Category I - VMSKEY: V0053187
2014-A-0058 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0049579
2014-A-0012 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0043396
2013-A-0195 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0040781
2013-A-0194 Multiple Vulnerabilities in Juniper Networks JUNOS
Severity: Category I - VMSKEY: V0040788
2011-B-0026 HP-UX Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0026084
2008-T-0043 Multiple Sun Solaris snoop Vulnerabilities
Severity: Category II - VMSKEY: V0017141
2008-T-0029 Sun Solaris Unspecified Remote Denial of Service Vulnerability
Severity: Category II - VMSKEY: V0016060
2008-T-0022 Sun Solaris TCP Implementation SYN Flood Denial of Service
Severity: Category I - VMSKEY: V0016026
2008-T-0021 Sun Solaris Print Service Unspecified Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0016018
2008-A-0025 Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execu...
Severity: Category I - VMSKEY: V0015977
2007-B-0006 Sun Solaris Telnet Remote Authentication Bypass Vulnerability
Severity: Category I - VMSKEY: V0013607
2005-T-0043 Sun Solaris Management Console HTTP TRACE Information Disclosure Vulnerability
Severity: Category II - VMSKEY: V0011706

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10 RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10 portmap snmpXdmi request TCP
RuleID : 593-community - Type : PROTOCOL-RPC - Revision : 31
2014-01-10 portmap snmpXdmi request TCP
RuleID : 593 - Type : PROTOCOL-RPC - Revision : 31
2014-01-10 portmap ttdbserv request UDP
RuleID : 588-community - Type : PROTOCOL-RPC - Revision : 27
2014-01-10 portmap ttdbserv request UDP
RuleID : 588 - Type : PROTOCOL-RPC - Revision : 27
2014-01-10 portmap selection_svc request UDP
RuleID : 586-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap selection_svc request UDP
RuleID : 586 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap pcnfsd request UDP
RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap pcnfsd request UDP
RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18
2014-01-10 portmap nisd request UDP
RuleID : 580-community - Type : PROTOCOL-RPC - Revision : 21
2014-01-10 portmap nisd request UDP
RuleID : 580 - Type : PROTOCOL-RPC - Revision : 21
2014-01-10 portmap amountd request UDP
RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 portmap amountd request UDP
RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17
2014-01-10 DOS ttdbserv Solaris
RuleID : 572-community - Type : PROTOCOL-RPC - Revision : 14
2014-01-10 DOS ttdbserv Solaris
RuleID : 572 - Type : PROTOCOL-RPC - Revision : 14
2014-01-10 EXPLOIT ttdbserv Solaris overflow
RuleID : 571 - Type : RPC - Revision : 10
2014-01-10 EXPLOIT ttdbserv solaris overflow
RuleID : 570 - Type : RPC - Revision : 12
2014-01-10 snmpXdmi overflow attempt TCP
RuleID : 569-community - Type : PROTOCOL-RPC - Revision : 25
2014-01-10 snmpXdmi overflow attempt TCP
RuleID : 569 - Type : PROTOCOL-RPC - Revision : 25
2014-01-10 Source Quench
RuleID : 477 - Type : ICMP - Revision : 6
2014-01-10 IRDP router selection
RuleID : 364-community - Type : PROTOCOL-ICMP - Revision : 11
2014-01-10 IRDP router selection
RuleID : 364 - Type : PROTOCOL-ICMP - Revision : 11
2014-01-10 IRDP router advertisement
RuleID : 363-community - Type : PROTOCOL-ICMP - Revision : 11
2014-01-10 IRDP router advertisement
RuleID : 363 - Type : PROTOCOL-ICMP - Revision : 11

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-01 Name: The remote host has an account with a default password.
File: account_admin_QwestM0dem.nasl - Type: ACT_GATHER_INFO
2017-05-08 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL23440942.nasl - Type: ACT_GATHER_INFO
2017-04-07 Name: The remote system can be accessed with a default administrator account.
File: account_admin_adminIWSS85.nasl - Type: ACT_GATHER_INFO
2017-04-07 Name: The remote system can be accessed with a default administrator account.
File: account_root_adminIWSS85.nasl - Type: ACT_GATHER_INFO
2016-11-10 Name: The remote system can be accessed with a default administrator account.
File: account_admin_Passw0rd.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_666666_666666.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_888888_888888.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote host has an account with no password set.
File: account_admin.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin1_password.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_1111.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_1111111.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_1234.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_12345.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_123456.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_4321.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_54321.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_7ujMko0admin.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_admin1234.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_meinsm.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_pass.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_admin_smcadmin.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_administrator_1234.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote system can be accessed with a default administrator account.
File: account_administrator_meinsm.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote host has an account with a default password.
File: account_guest_12345.nasl - Type: ACT_GATHER_INFO
2016-10-28 Name: The remote host has an account with a default password.
File: account_mother_fucker.nasl - Type: ACT_GATHER_INFO