Lucene search

K

Solstice Security Vulnerabilities

cve
cve

CVE-2020-35587

In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack...

7.5CVSS

7.5AI Score

0.001EPSS

2020-12-23 04:15 PM
39
cve
cve

CVE-2020-35584

In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any...

5.9CVSS

5.5AI Score

0.002EPSS

2020-12-23 03:15 PM
20
cve
cve

CVE-2020-35585

In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million...

7.5CVSS

7.5AI Score

0.002EPSS

2020-12-23 03:15 PM
16
cve
cve

CVE-2020-35586

In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase...

7.5CVSS

7.6AI Score

0.002EPSS

2020-12-23 03:15 PM
17
cve
cve

CVE-2020-27523

Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of...

7.5CVSS

7.5AI Score

0.004EPSS

2020-11-11 03:15 PM
16
cve
cve

CVE-2017-12945

Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as...

8.8CVSS

8.9AI Score

0.042EPSS

2019-11-27 04:15 PM
45
cve
cve

CVE-2008-5009

Race condition in the s_xout kernel module in Sun Solstice X.25 9.2, when running on a multiple CPU machine, allows local users to cause a denial of service (panic) via vectors involving reading the /dev/xty...

5.7AI Score

0.0004EPSS

2008-11-10 03:23 PM
19
cve
cve

CVE-2005-0358

EMC Legato NetWorker, Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 6.0 through 7.2 do not properly verify authentication tokens, which allows remote attackers to gain privileges by modifying an authentication...

6.8AI Score

0.033EPSS

2005-08-23 04:00 AM
24
cve
cve

CVE-2005-0359

The Legato PortMapper in EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 does not restrict access to the pmap_set and pmap_unset commands, which allows remote attackers to (1) cause a denial of service by using pmap_unset to un-register a...

6.4AI Score

0.022EPSS

2005-08-23 04:00 AM
28
cve
cve

CVE-2005-0357

EMC Legato NetWorker, Sun Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 7.0 through 7.2 rely on AUTH_UNIX authentication, which relies on user ID for authentication and allows remote attackers to bypass authentication and gain privileges by spoofing a username or...

6.8AI Score

0.004EPSS

2005-08-23 04:00 AM
30
cve
cve

CVE-2005-1682

JavaMail API, as used by Solstice Internet Mail Server POP3 2.0, does not properly validate the message number in the MimeMessage constructor in javax.mail.internet.InternetHeaders, which allows remote authenticated users to read other users' e-mail messages by modifying the msgno parameter. ...

6.8AI Score

0.002EPSS

2005-05-25 04:00 AM
19
cve
cve

CVE-2000-0069

The recover program in Solstice Backup allows local users to restore sensitive...

6.6AI Score

0.0004EPSS

2000-02-04 05:00 AM
25
4