Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2400 (GCVE-0-2010-2400)
Vulnerability from cvelistv5 – Published: 2010-07-13 22:07 – Updated: 2024-08-07 02:32- n/a
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.640Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-10-23T09:00:00",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-2400",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2010-2400",
"datePublished": "2010-07-13T22:07:00",
"dateReserved": "2010-06-21T00:00:00",
"dateUpdated": "2024-08-07T02:32:16.640Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D7F3547-5085-43B2-8179-4AC23F4A9CE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F864AD7-53A2-4225-870F-062876CE45DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad sin especificar en Oracle Solaris v9 y v10 y OpenSolaris, permite a usuarios locales afectar la disponibilidad a trav\\u00e9s de vectores desconocidos relacionado con Kernel/Filesystem.\"}]",
"id": "CVE-2010-2400",
"lastModified": "2024-11-21T01:16:34.513",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:S/C:N/I:N/A:C\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.1, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2010-07-13T22:30:03.140",
"references": "[{\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\", \"source\": \"secalert_us@oracle.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-2400\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2010-07-13T22:30:03.140\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad sin especificar en Oracle Solaris v9 y v10 y OpenSolaris, permite a usuarios locales afectar la disponibilidad a trav\u00e9s de vectores desconocidos relacionado con Kernel/Filesystem.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:N/I:N/A:C\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.1,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7F3547-5085-43B2-8179-4AC23F4A9CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F864AD7-53A2-4225-870F-062876CE45DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2010-AVI-316
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans Sun Solaris permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
Plusieurs vulnérabilités sont présentes dans le système d'exploitation Sun Solaris. Ces vulnérabilités permettent à un utilisateur distant :
- d'exécution de code arbitraire ;
- de provoquer un déni de service ;
- de porter atteinte à l'intégrité de certaines données ;
- de porter atteinte à la confidentialité de certaines données ;
- de conduire des attaques de type injection de code indirecte à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Solaris 10.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le syst\u00e8me d\u0027exploitation\nSun Solaris. Ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant :\n\n- d\u0027ex\u00e9cution de code arbitraire ;\n- de provoquer un d\u00e9ni de service ;\n- de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 de certaines donn\u00e9es ;\n- de porter atteinte \u00e0 la confidentialit\u00e9 de certaines donn\u00e9es ;\n- de conduire des attaques de type injection de code indirecte \u00e0\n distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Sun solaris du 13 juillet 2010 :",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
],
"reference": "CERTA-2010-AVI-316",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Sun Solaris permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Sun Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris",
"url": null
}
]
}
CERTA-2010-AVI-314
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans les produits Oracle permettent à un utilisateur distant de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
De multiples vulnérabilités sont présentes dans les produits Oracle comme Oracle Database ou Oracle WebLogic. Elles permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitaire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Secure Backup version 10301 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9208, 9208DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, versions 849 et 850 ; | ||
| Oracle | N/A | Oracle JRockit versions R2800 et antérieures (JDK/JRE 5 et 6) ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ; | ||
| Oracle | N/A | Oracle JRockit versions R2766 et antérieures (JDK/JRE 142, 5 et 6) ; | ||
| Oracle | N/A | Oracle Database 11g Release 2, version 11201 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM, versions 89, 90 et 91 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 100 jusqu'à la version MP2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 70 jusqu'au Service Pack 7 ; | ||
| Oracle | N/A | Oracle Sun Product Suite. | ||
| Oracle | Weblogic | Oracle WebLogic Server 90, 91, 92 jusqu'à la version MP3 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ; | ||
| Oracle | N/A | Oracle Business Process Management, versions 573, 605, 1031 et 1032 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 81 jusqu'au Service Pack 6 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise Campus Solutions, version 90 ; | ||
| Oracle | N/A | Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, versions 11510 et 115102 ; | ||
| Oracle | N/A | Oracle Application Server, 10gR2, version 101230 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, version 101401 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CRM, versions 90 et 91 ; | ||
| Oracle | N/A | Oracle TimesTen In-Memory Database, versions 7060, 112141 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10203, 10204 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10105 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10gR3 version 1030 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1, version 11107 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Backup version 10301 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9208, 9208DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools, versions 849 et 850 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2800 et ant\u00e9rieures (JDK/JRE 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2766 et ant\u00e9rieures (JDK/JRE 142, 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2, version 11201 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 100 jusqu\u0027\u00e0 la version MP2 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 70 jusqu\u0027au Service Pack 7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 90, 91, 92 jusqu\u0027\u00e0 la version MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Process Management, versions 573, 605, 1031 et 1032 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 81 jusqu\u0027au Service Pack 6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise Campus Solutions, version 90 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, versions 11510 et 115102 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server, 10gR2, version 101230 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, version 101401 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CRM, versions 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle TimesTen In-Memory Database, versions 7060, 112141 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10203, 10204 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10105 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10gR3 version 1030 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1, version 11107 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits Oracle\ncomme Oracle Database ou Oracle WebLogic. Elles permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitaire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0906",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0906"
},
{
"name": "CVE-2010-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0898"
},
{
"name": "CVE-2010-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2380"
},
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0903"
},
{
"name": "CVE-2010-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0899"
},
{
"name": "CVE-2010-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2381"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2373"
},
{
"name": "CVE-2010-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0909"
},
{
"name": "CVE-2010-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0907"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-0914",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0914"
},
{
"name": "CVE-2010-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0901"
},
{
"name": "CVE-2010-0892",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0892"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0915"
},
{
"name": "CVE-2010-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0873"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2009-3763",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3763"
},
{
"name": "CVE-2010-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2375"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2374"
},
{
"name": "CVE-2010-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2402"
},
{
"name": "CVE-2010-0912",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0912"
},
{
"name": "CVE-2010-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0913"
},
{
"name": "CVE-2010-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2401"
},
{
"name": "CVE-2009-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3764"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-0911",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0911"
},
{
"name": "CVE-2010-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2372"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2010-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2398"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0081"
},
{
"name": "CVE-2010-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2377"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-0835",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0835"
},
{
"name": "CVE-2010-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2403"
},
{
"name": "CVE-2010-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2378"
},
{
"name": "CVE-2010-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0900"
},
{
"name": "CVE-2010-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0908"
},
{
"name": "CVE-2010-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2370"
},
{
"name": "CVE-2010-0910",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0910"
},
{
"name": "CVE-2010-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0904"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
},
{
"name": "CVE-2010-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0902"
},
{
"name": "CVE-2010-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2385"
},
{
"name": "CVE-2009-3762",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3762"
},
{
"name": "CVE-2010-0905",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0905"
},
{
"name": "CVE-2010-0836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0836"
},
{
"name": "CVE-2010-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2371"
},
{
"name": "CVE-2010-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2379"
},
{
"name": "CVE-2010-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2397"
}
],
"links": [],
"reference": "CERTA-2010-AVI-314",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits Oracle\npermettent \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service ou\nd\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 13 juillet 2010",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
]
}
CERTA-2010-AVI-316
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans Sun Solaris permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
Plusieurs vulnérabilités sont présentes dans le système d'exploitation Sun Solaris. Ces vulnérabilités permettent à un utilisateur distant :
- d'exécution de code arbitraire ;
- de provoquer un déni de service ;
- de porter atteinte à l'intégrité de certaines données ;
- de porter atteinte à la confidentialité de certaines données ;
- de conduire des attaques de type injection de code indirecte à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sun Solaris 10.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Sun Solaris 9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le syst\u00e8me d\u0027exploitation\nSun Solaris. Ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur distant :\n\n- d\u0027ex\u00e9cution de code arbitraire ;\n- de provoquer un d\u00e9ni de service ;\n- de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 de certaines donn\u00e9es ;\n- de porter atteinte \u00e0 la confidentialit\u00e9 de certaines donn\u00e9es ;\n- de conduire des attaques de type injection de code indirecte \u00e0\n distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Sun solaris du 13 juillet 2010 :",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
],
"reference": "CERTA-2010-AVI-316",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Sun Solaris permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Sun Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Sun Solaris",
"url": null
}
]
}
CERTA-2010-AVI-314
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans les produits Oracle permettent à un utilisateur distant de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
De multiples vulnérabilités sont présentes dans les produits Oracle comme Oracle Database ou Oracle WebLogic. Elles permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitaire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Secure Backup version 10301 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9208, 9208DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, versions 849 et 850 ; | ||
| Oracle | N/A | Oracle JRockit versions R2800 et antérieures (JDK/JRE 5 et 6) ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ; | ||
| Oracle | N/A | Oracle JRockit versions R2766 et antérieures (JDK/JRE 142, 5 et 6) ; | ||
| Oracle | N/A | Oracle Database 11g Release 2, version 11201 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM, versions 89, 90 et 91 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 100 jusqu'à la version MP2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 70 jusqu'au Service Pack 7 ; | ||
| Oracle | N/A | Oracle Sun Product Suite. | ||
| Oracle | Weblogic | Oracle WebLogic Server 90, 91, 92 jusqu'à la version MP3 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ; | ||
| Oracle | N/A | Oracle Business Process Management, versions 573, 605, 1031 et 1032 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 81 jusqu'au Service Pack 6 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise Campus Solutions, version 90 ; | ||
| Oracle | N/A | Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, versions 11510 et 115102 ; | ||
| Oracle | N/A | Oracle Application Server, 10gR2, version 101230 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, version 101401 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CRM, versions 90 et 91 ; | ||
| Oracle | N/A | Oracle TimesTen In-Memory Database, versions 7060, 112141 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10203, 10204 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10105 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10gR3 version 1030 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1, version 11107 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Backup version 10301 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9208, 9208DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools, versions 849 et 850 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2800 et ant\u00e9rieures (JDK/JRE 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2766 et ant\u00e9rieures (JDK/JRE 142, 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2, version 11201 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 100 jusqu\u0027\u00e0 la version MP2 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 70 jusqu\u0027au Service Pack 7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 90, 91, 92 jusqu\u0027\u00e0 la version MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Process Management, versions 573, 605, 1031 et 1032 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 81 jusqu\u0027au Service Pack 6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise Campus Solutions, version 90 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, versions 11510 et 115102 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server, 10gR2, version 101230 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, version 101401 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CRM, versions 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle TimesTen In-Memory Database, versions 7060, 112141 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10203, 10204 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10105 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10gR3 version 1030 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1, version 11107 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits Oracle\ncomme Oracle Database ou Oracle WebLogic. Elles permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitaire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0906",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0906"
},
{
"name": "CVE-2010-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0898"
},
{
"name": "CVE-2010-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2380"
},
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0903"
},
{
"name": "CVE-2010-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0899"
},
{
"name": "CVE-2010-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2381"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2373"
},
{
"name": "CVE-2010-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0909"
},
{
"name": "CVE-2010-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0907"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-0914",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0914"
},
{
"name": "CVE-2010-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0901"
},
{
"name": "CVE-2010-0892",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0892"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0915"
},
{
"name": "CVE-2010-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0873"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2009-3763",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3763"
},
{
"name": "CVE-2010-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2375"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2374"
},
{
"name": "CVE-2010-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2402"
},
{
"name": "CVE-2010-0912",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0912"
},
{
"name": "CVE-2010-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0913"
},
{
"name": "CVE-2010-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2401"
},
{
"name": "CVE-2009-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3764"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-0911",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0911"
},
{
"name": "CVE-2010-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2372"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2010-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2398"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0081"
},
{
"name": "CVE-2010-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2377"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-0835",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0835"
},
{
"name": "CVE-2010-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2403"
},
{
"name": "CVE-2010-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2378"
},
{
"name": "CVE-2010-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0900"
},
{
"name": "CVE-2010-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0908"
},
{
"name": "CVE-2010-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2370"
},
{
"name": "CVE-2010-0910",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0910"
},
{
"name": "CVE-2010-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0904"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
},
{
"name": "CVE-2010-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0902"
},
{
"name": "CVE-2010-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2385"
},
{
"name": "CVE-2009-3762",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3762"
},
{
"name": "CVE-2010-0905",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0905"
},
{
"name": "CVE-2010-0836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0836"
},
{
"name": "CVE-2010-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2371"
},
{
"name": "CVE-2010-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2379"
},
{
"name": "CVE-2010-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2397"
}
],
"links": [],
"reference": "CERTA-2010-AVI-314",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits Oracle\npermettent \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service ou\nd\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 13 juillet 2010",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
]
}
FKIE_CVE-2010-2400
Vulnerability from fkie_nvd - Published: 2010-07-13 22:30 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7F3547-5085-43B2-8179-4AC23F4A9CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*",
"matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem."
},
{
"lang": "es",
"value": "Vulnerabilidad sin especificar en Oracle Solaris v9 y v10 y OpenSolaris, permite a usuarios locales afectar la disponibilidad a trav\u00e9s de vectores desconocidos relacionado con Kernel/Filesystem."
}
],
"id": "CVE-2010-2400",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-07-13T22:30:03.140",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2010-2400
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-2400",
"description": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.",
"id": "GSD-2010-2400"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-2400"
],
"details": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.",
"id": "GSD-2010-2400",
"modified": "2023-12-13T01:21:31.401620Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-2400",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:oracle:opensolaris:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2010-2400"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2012-10-23T03:25Z",
"publishedDate": "2010-07-13T22:30Z"
}
}
}
GHSA-3H9F-3QCX-PQF9
Vulnerability from github – Published: 2022-05-17 05:19 – Updated: 2022-05-17 05:19Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.
{
"affected": [],
"aliases": [
"CVE-2010-2400"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-07-13T22:30:00Z",
"severity": "MODERATE"
},
"details": "Unspecified vulnerability in Oracle Solaris 9 and 10, and OpenSolaris, allows local users to affect availability via unknown vectors related to Kernel/Filesystem.",
"id": "GHSA-3h9f-3qcx-pqf9",
"modified": "2022-05-17T05:19:50Z",
"published": "2022-05-17T05:19:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2400"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.