Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle sun products suite 3.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2010-0883
Unspecified vulnerability in the Sun Cluster component in Oracle Sun Product Suite 3.1 and 3.2 allows local users to affect confidentiality via unknown vectors related to Data Service for Oracle E-Business Suite, a different vulnerability than CVE-2010-0884.
Oracle Sun Products Suite 3.2
Oracle Sun Products Suite 3.1
2.1
CVSSv2
CVE-2010-0884
Unspecified vulnerability in the Sun Cluster component in Oracle Sun Product Suite 3.1 and 3.2 allows local users to affect confidentiality via unknown vectors related to Data Service for Oracle E-Business Suite, a different vulnerability than CVE-2010-0883.
Oracle Sun Products Suite 3.1
Oracle Sun Products Suite 3.2
9.3
CVSSv2
CVE-2015-4821
Unspecified vulnerability in the Integrated Lights Out Manager (ILOM) component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to Web.
Oracle Oracle And Sun Systems Product Suite 3.0
Oracle Oracle And Sun Systems Product Suite 3.1
Oracle Oracle And Sun Systems Product Suite 3.2
10
CVSSv2
CVE-2015-4915
Unspecified vulnerability in the Integrated Lights Out Manager (ILOM) component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors related to System Management.
Oracle Oracle And Sun Systems Product Suite 3.0
Oracle Oracle And Sun Systems Product Suite 3.1
Oracle Oracle And Sun Systems Product Suite 3.2
4.3
CVSSv2
CVE-2015-0452
Unspecified vulnerability in the Oracle VM Server for SPARC component in Oracle Sun Systems Products Suite 3.1 and 3.2 allows remote malicious users to affect confidentiality via unknown vectors related to Ldom Manager.
Oracle Vm Server 3.1
Oracle Vm Server 3.2
4.3
CVSSv2
CVE-2016-3451
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect integrity via vectors related to Web.
Oracle Integrated Lights Out Manager Firmware 3.2
Oracle Integrated Lights Out Manager Firmware 3.0
Oracle Integrated Lights Out Manager Firmware 3.1
7.5
CVSSv2
CVE-2016-5445
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Integrated Lights Out Manager Firmware 3.0
Oracle Integrated Lights Out Manager Firmware 3.1
Oracle Integrated Lights Out Manager Firmware 3.2
4
CVSSv2
CVE-2016-3481
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote authenticated users to affect availability via vectors related to Web.
Oracle Integrated Lights Out Manager Firmware 3.1
Oracle Integrated Lights Out Manager Firmware 3.2
Oracle Integrated Lights Out Manager Firmware 3.0
5
CVSSv2
CVE-2016-5449
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect availability via vectors related to Console Redirection.
Oracle Integrated Lights Out Manager Firmware 3.0
Oracle Integrated Lights Out Manager Firmware 3.1
Oracle Integrated Lights Out Manager Firmware 3.2
5.8
CVSSv2
CVE-2016-3585
Unspecified vulnerability in the ILOM component in Oracle Sun Systems Products Suite 3.0, 3.1, and 3.2 allows remote malicious users to affect confidentiality and integrity via vectors related to Emulex.
Oracle Integrated Lights Out Manager Firmware 3.1
Oracle Integrated Lights Out Manager Firmware 3.2
Oracle Integrated Lights Out Manager Firmware 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »