CINXE.COM
Solaris Local Security Checks Plugins | Tenable®
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><title>Solaris Local Security Checks Plugins<!-- --> | Tenable®</title><meta name="description" content="Listing all plugins in the Solaris Local Security Checks family"/><meta property="og:title" content="Solaris Local Security Checks Plugins"/><meta property="og:description" content="Listing all plugins in the Solaris Local Security Checks family"/><meta name="twitter:title" content="Solaris Local Security Checks Plugins"/><meta name="twitter:description" content="Listing all plugins in the Solaris Local Security Checks family"/><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="apple-touch-icon" sizes="180x180" href="https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png"/><link rel="manifest" href="https://www.tenable.com/themes/custom/tenable/img/favicons/manifest.json"/><link rel="mask-icon" href="https://www.tenable.com/themes/custom/tenable/img/favicons/safari-pinned-tab.svg" color="#0071dd"/><link rel="icon" href="https://www.tenable.com/favicon.ico" sizes="any"/><link rel="icon" href="https://www.tenable.com/themes/custom/tenable/img/favicons/favicon.svg" type="image/svg+xml"/><meta name="msapplication-config" content="https://www.tenable.com/themes/custom/tenable/img/favicons/browserconfig.xml"/><meta name="theme-color" content="#ffffff"/><link rel="canonical" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="x-default" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="en" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="de" href="https://de.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="es" href="https://es-la.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="fr" href="https://fr.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="ja" href="https://jp.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="ko" href="https://kr.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="zh-CN" href="https://www.tenablecloud.cn/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><link rel="alternate" hrefLang="zh-TW" href="https://zh-tw.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks"/><meta name="next-head-count" content="26"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.info = {"agent":"","beacon":"bam.nr-data.net","errorBeacon":"bam.nr-data.net","licenseKey":"5febff3e0e","applicationID":"96358297","agentToken":null,"applicationTime":89.411607,"transactionName":"MVBabEEHChVXU0IIXggab11RIBYHW1VBDkMNYEpRHCgBHkJaRU52I2EXF0MKEQFfXkVOahJMSF1uSQIHW1laCFQVGmNeUgsNCk9t","queueTime":0,"ttGuid":"ed93ec9f162665af"}; (window.NREUM||(NREUM={})).init={ajax:{deny_list:["bam.nr-data.net"]}};(window.NREUM||(NREUM={})).loader_config={licenseKey:"5febff3e0e",applicationID:"96358297"};;/*! For license information please see nr-loader-rum-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>g,gD:()=>h,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function g(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function h(e,t){if(!e)throw new Error(f);var r=g(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,xv:()=>n});const n="1.274.0",i="PROD",o="CDN"},6154:(e,t,r)=>{"use strict";r.d(t,{OF:()=>c,RI:()=>i,WN:()=>d,bv:()=>o,gm:()=>a,mw:()=>s,sb:()=>u});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=Boolean("hidden"===a?.document?.visibilityState),c=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),u=c&&"undefined"==typeof SharedWorker,d=((()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);Array.isArray(e)&&e.length>=2&&e[1]})(),Date.now()-(0,n.t)())},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),g(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return g(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),g(e,t)})))}function g(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=g(n),c=h(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=m()[s[e]];p&&p.push([f,e,r,a]);return a},get:v,listeners:h,context:g,buffer:function(e,t){const r=m();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!m()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function g(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=h(e).concat(t)}function h(e){return n[e]||[]}function v(t){return d[t]=d[t]||e(f,t)}function m(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,bz:()=>a});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},3434:(e,t,r)=>{"use strict";r.d(t,{YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log";n.K7.logging},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{G4:()=>i});var n=r(2614);r(860).K7.sessionReplay;const i={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"};n.g.ERROR,n.g.FULL,n.g.OFF},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7603:(e,t,r)=>{"use strict";r.d(t,{j:()=>P});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),g=r(384),p=r(6344);const h=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],v=["setErrorHandler","finished","addToTrace","addRelease"];var m=r(1863),b=r(2614),y=r(993);var w=r(2646),A=r(3434);function R(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,A.YM)(i),a=new w.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function E(){const e=(0,g.pV)();h.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const x={};function _(e,t,g=!1){t||(0,c.Ak)(e,"api");const h={};var w=s.ee.get(e),A=w.get("tracer");x[e]=b.g.OFF,w.on(p.G4.REPLAY_RUNNING,(t=>{x[e]=t}));var E="api-",_=E+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),j(E,n,!0,o||null===r?"session":void 0)(t,r)}function T(){}h.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,w),function(e,t,r={},i=y.p_.INFO){(0,a.p)(f.xV,["API/logging/".concat(i.toLowerCase(),"/called")],void 0,n.K7.metrics,e),(0,a.p)(y.ET,[(0,m.t)(),t,r,i],void 0,n.K7.logging,e)}(w,e,t,r)},h.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,w),R(w,e,t,{customAttributes:r,level:i})},v.forEach((e=>{h[e]=j(E,e,!0,"api")})),h.addPageAction=j(E,"addPageAction",!0,n.K7.genericEvents),h.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,j(E,"setPageViewName",!0)()},h.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},h.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},h.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},h.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,w),w.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},h[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,w)},h[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,w)},h.interaction=function(e){return(new T).get("object"==typeof e?e:{})};const S=T.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,w),g||(0,a.p)(_+"tracer",[(0,m.t)(),e,r],i,n.K7.spa,w),function(){if(A.emit((o?"":"no-")+"fn-start",[(0,m.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw A.emit("fn-err",[arguments,this,t],r),t}finally{A.emit("fn-end",[(0,m.t)()],r)}}}};function j(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,w),i&&(0,a.p)(e+t,[(0,m.t)(),...arguments],r?null:this,i,w),r?void 0:this}}function k(){r.e(296).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),w.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{S[e]=j(_,e,void 0,g?n.K7.softNav:n.K7.spa)})),h.setCurrentRouteName=g?j(_,"routeName",void 0,n.K7.softNav):j(E,"routeName",!0,n.K7.spa),h.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,w),(0,a.p)("err",[t,(0,m.t)(),!1,r,!!x[e]],void 0,n.K7.jserrors,w)},d.RI?(0,u.GG)((()=>k()),!0):k(),h}var N=r(9417),T=r(8122);const S={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},j={};var k=r(5284);const I=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let O=!1;function P(e,t={},r,n){let{init:a,info:c,loader_config:u,runtime:l={},exposed:f=!0}=t;l.loaderType=r;const p=(0,g.pV)();c||(a=p.init,c=p.info,u=p.loader_config),(0,N.xN)(e.agentIdentifier,a||{}),function(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");j[e]=(0,T.a)(t,S);const r=(0,g.nY)(e);r&&(r.loader_config=j[e])}(e.agentIdentifier,u||{}),c.jsAttributes??={},d.bv&&(c.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,c);const h=(0,N.D0)(e.agentIdentifier),v=[c.beacon,c.errorBeacon];O||(h.proxy.assets&&(I(h.proxy.assets),v.push(h.proxy.assets)),h.proxy.beacon&&v.push(h.proxy.beacon),E(),(0,g.US)("activatedFeatures",k.B),e.runSoftNavOverSpa&&=!0===h.soft_navigations.enabled&&h.feature_flags.includes("soft_nav")),l.denyList=[...h.ajax.deny_list||[],...h.ajax.block_internal?v:[]],l.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,l),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=_(e.agentIdentifier,n,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=f),O=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>"nr-rum-1.274.0.min.js",i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={296:"sha512-gkYkZDAwQ9PwaDXs2YM+rNIdRej1Ac1mupWobRJ8eahQcXz6/sunGZCKklrzi5kWxhOGRZr2tn0rEKuLTXzfAA=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var g=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(g.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=g.bind(null,s.onerror),s.onload=g.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={840:0,374:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(7603);var l=i(1687),f=i(4234),g=i(5289),p=i(6154),h=i(384);const v=e=>p.RI&&!0===(0,s.gD)(e,"privacy.cookies_enabled");function m(e){return!!(0,h.dV)().o.MO&&v(e)&&!0===(0,s.gD)(e,"session_trace.enabled")}var b=i(6389);class y extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,b.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if(v(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(296).then(i.bind(i,3861));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(296).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(296).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,g.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return m(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var w=i(6630);class A extends y{static featureName=w.T;constructor(e,t=!0){super(e,w.T,t),this.importAggregator(e)}}var R=i(9908),E=i(2843),x=i(3878),_=i(782),N=i(1863);class T extends y{static featureName=_.T;constructor(e,t=!0){super(e,_.T,t),p.RI&&((0,E.u)((()=>(0,R.p)("docHidden",[(0,N.t)()],void 0,_.T,this.ee)),!0),(0,x.sp)("pagehide",(()=>(0,R.p)("winPagehide",[(0,N.t)()],void 0,_.T,this.ee))),this.importAggregator(e))}}var S=i(3969);class j extends y{static featureName=S.TZ;constructor(e,t=!0){super(e,S.TZ,t),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,h.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(A),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,h.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[A,T,j],loaderType:"lite"})})()})();</script><link data-next-font="size-adjust" rel="preconnect" href="/" crossorigin="anonymous"/><link nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" rel="preload" href="/_next/static/css/ffa80ed36c27c549.css" as="style"/><link nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" rel="stylesheet" href="/_next/static/css/ffa80ed36c27c549.css" data-n-g=""/><noscript data-n-css="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx"></noscript><script defer="" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" nomodule="" src="/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js"></script><script src="/_next/static/chunks/webpack-a707e99c69361791.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/chunks/framework-b0ec748c7a4c483a.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/chunks/main-dbb03be72fb978ea.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/chunks/pages/_app-db8f48fde056b518.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/chunks/9177-dfdc6421d8bd40ea.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/chunks/pages/plugins/%5Btype%5D/families/%5Bfamily%5D-f765c4b37fa0da30.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/l4vcnKDxIXiOkUtvMoFnX/_buildManifest.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script><script src="/_next/static/l4vcnKDxIXiOkUtvMoFnX/_ssgManifest.js" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx" defer=""></script></head><body data-base-url="https://www.tenable.com" data-ga4-tracking-id=""><div id="__next"><div class="app__wrapper"><header class="banner"><div class="nav-wrapper"><ul class="list-inline nav-brand"><li class="list-inline-item"><a href="https://www.tenable.com"><img class="logo" src="https://www.tenable.com/themes/custom/tenable/img/logo.png" alt="Tenable"/></a></li><li class="list-inline-item"><a class="app-name" href="https://www.tenable.com/plugins">Plugins</a></li></ul><ul class="nav-dropdown nav"><li class="d-none d-md-block dropdown nav-item"><a aria-haspopup="true" href="#" class="dropdown-toggle nav-link" aria-expanded="false">Settings</a><div tabindex="-1" role="menu" aria-hidden="true" class="dropdown-menu dropdown-menu-right"><h6 tabindex="-1" class="dropdown-header">Links</h6><a href="https://cloud.tenable.com" role="menuitem" class="dropdown-item">Tenable Cloud<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><a href="https://community.tenable.com/login" role="menuitem" class="dropdown-item">Tenable Community & Support<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><a href="https://university.tenable.com/lms/index.php?r=site/sso&sso_type=saml" role="menuitem" class="dropdown-item">Tenable University<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><div tabindex="-1" class="dropdown-divider"></div><span tabindex="-1" class="dropdown-item-text"><div class="d-flex justify-content-between toggle-btn-group flex-column"><div class="label mb-2">Severity<!-- --> <i class="fas fa-info-circle" id="preferredSeverity"></i></div><div role="group" class="btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary">VPR</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v2</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v3</button><button type="button" class="toggle-btn btn btn-outline-primary active">CVSS v4</button></div></div></span><div tabindex="-1" class="dropdown-divider"></div><span tabindex="-1" class="dropdown-item-text"><div class="d-flex justify-content-between toggle-btn-group flex-row"><div class="label">Theme</div><div role="group" class="ml-3 btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary active">Light</button><button type="button" class="toggle-btn btn btn-outline-primary">Dark</button><button type="button" class="toggle-btn btn btn-outline-primary">Auto</button></div></div></span><div tabindex="-1" class="dropdown-divider"></div><button type="button" tabindex="0" role="menuitem" class="dropdown-item-link dropdown-item">Help</button></div></li></ul><div class="d-block d-md-none"><button type="button" aria-label="Toggle Overlay" class="btn btn-link nav-toggle"><i class="fas fa-bars fa-2x"></i></button></div></div></header><div class="mobile-nav closed"><ul class="flex-column nav"><li class="mobile-header nav-item"><a href="https://www.tenable.com" class="float-left nav-link"><img class="logo" src="https://www.tenable.com/themes/custom/tenable/img/logo-teal.png" alt="Tenable"/></a><a class="float-right mr-2 nav-link"><i class="fas fa-times fa-lg"></i></a></li><li class="nav-item"><a class="nav-link">Plugins<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/pipeline">Plugins Pipeline</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/search">Search</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/nessus/families?type=nessus">Nessus Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/was/families?type=was">WAS Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/nnm/families?type=nnm">NNM Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/lce/families?type=lce">LCE Families</a></li><li class="no-capitalize nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/ot/families?type=ot">Tenable OT Security Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/families/about">About Plugin Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/release-notes">Release Notes</a></li></div></div><li class="nav-item"><a class="nav-link">Audits<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/search">Search Audit Files</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/items/search">Search Items</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/references">References</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/authorities">Authorities</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/documentation">Documentation</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/downloads/download-all-compliance-audit-files">Download All Audit Files</a></li></div></div><li class="nav-item"><a class="nav-link">Indicators<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/search">Search</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/ioa">Indicators of Attack</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/ioe">Indicators of Exposure</a></li></div></div><li class="nav-item"><a class="nav-link">CVEs<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/search">Search</a></li></div></div><li class="nav-item"><a class="nav-link">Attack Path Techniques<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/attack-path-techniques">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/attack-path-techniques/search">Search</a></li></div></div><ul id="links-nav" class="flex-column mt-5 nav"><li class="nav-item"><a class="nav-link">Links<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a href="https://cloud.tenable.com" class="nav-link">Tenable Cloud</a></li><li class="nav-item"><a href="https://community.tenable.com/login" class="nav-link">Tenable Community & Support</a></li><li class="nav-item"><a href="https://university.tenable.com/lms/index.php?r=site/sso&sso_type=saml" class="nav-link">Tenable University</a></li></div></div><li class="nav-item"><a class="nav-link">Settings<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse py-3"><li class="nav-item"><div class="d-flex justify-content-between toggle-btn-group flex-column"><div class="label mb-2">Severity</div><div role="group" class="btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary">VPR</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v2</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v3</button><button type="button" class="toggle-btn btn btn-outline-primary active">CVSS v4</button></div></div></li><li class="nav-item"><div class="d-flex justify-content-between toggle-btn-group flex-row"><div class="label">Theme</div><div role="group" class="ml-3 btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary active">Light</button><button type="button" class="toggle-btn btn btn-outline-primary">Dark</button><button type="button" class="toggle-btn btn btn-outline-primary">Auto</button></div></div></li></div></div></ul></ul></div><div class="app__container"><div class="app__content"><div class="card callout callout-alert callout-bg-danger mb-4"><div class="card-body"><h5 class="mb-2 text-white">Your browser is no longer supported</h5><p class="text-white">Please update or use another browser for this application to function correctly.</p></div></div><div class="row"><div class="col-3 col-xl-2 d-none d-md-block"><h6 class="side-nav-heading">Detections</h6><ul class="side-nav bg-white sticky-top nav flex-column"><li class="nav-item"><a type="button" class="nav-link">Plugins<i class="float-right mt-1 fas fa-chevron-down"></i></a></li><div class="side-nav-collapse collapse show"><li class="false nav-item"><a href="/plugins" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/plugins/pipeline" class="nav-link"><span>Plugins Pipeline</span></a></li><li class="false nav-item"><a href="/plugins/release-notes" class="nav-link"><span>Release Notes</span></a></li><li class="false nav-item"><a href="/plugins/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/plugins/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/plugins/search" class="nav-link"><span>Search</span></a></li><li class="false nav-item"><a href="/plugins/nessus/families" class="nav-link"><span>Nessus Families</span></a></li><li class="false nav-item"><a href="/plugins/was/families" class="nav-link"><span>WAS Families</span></a></li><li class="false nav-item"><a href="/plugins/nnm/families" class="nav-link"><span>NNM Families</span></a></li><li class="false nav-item"><a href="/plugins/lce/families" class="nav-link"><span>LCE Families</span></a></li><li class="false nav-item"><a href="/plugins/ot/families" class="nav-link"><span>Tenable OT Security Families</span></a></li><li class="false nav-item"><a href="/plugins/families/about" class="nav-link"><span>About Plugin Families</span></a></li></div><li class="nav-item"><a type="button" class="nav-link">Audits<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/audits" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/audits/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/audits/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/audits/search" class="nav-link"><span>Search Audit Files</span></a></li><li class="false nav-item"><a href="/audits/items/search" class="nav-link"><span>Search Items</span></a></li><li class="false nav-item"><a href="/audits/references" class="nav-link"><span>References</span></a></li><li class="false nav-item"><a href="/audits/authorities" class="nav-link"><span>Authorities</span></a></li><li class="false nav-item"><a href="/audits/documentation" class="nav-link"><span>Documentation</span></a></li><li class="nav-item"><a class="nav-link" href="https://www.tenable.com/downloads/download-all-compliance-audit-files">Download All Audit Files</a></li></div><li class="nav-item"><a type="button" class="nav-link">Indicators<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/indicators" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/indicators/search" class="nav-link"><span>Search</span></a></li><li class="false nav-item"><a href="/indicators/ioa" class="nav-link"><span>Indicators of Attack</span></a></li><li class="false nav-item"><a href="/indicators/ioe" class="nav-link"><span>Indicators of Exposure</span></a></li></div></ul><h6 class="side-nav-heading">Analytics</h6><ul class="side-nav bg-white sticky-top nav flex-column"><li class="nav-item"><a type="button" class="nav-link">CVEs<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/cve" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/cve/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/cve/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/cve/search" class="nav-link"><span>Search</span></a></li></div><li class="nav-item"><a type="button" class="nav-link">Attack Path Techniques<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/attack-path-techniques" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/attack-path-techniques/search" class="nav-link"><span>Search</span></a></li></div></ul></div><div class="col-12 col-md-9 col-xl-10"><h1 class="mb-3 h2">Solaris Local Security Checks Family for Nessus</h1><nav class="d-none d-md-block" aria-label="breadcrumb"><ol class="breadcrumb"><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins">Plugins</a></li><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins/nessus/families?type=nessus">Nessus Plugin Families</a></li><li class="active breadcrumb-item" aria-current="page">Solaris Local Security Checks</li></ol></nav><nav class="d-md-none" aria-label="breadcrumb"><ol class="breadcrumb"><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins/nessus/families?type=nessus"><i class="fas fa-chevron-left"></i> <!-- -->Nessus Plugin Families</a></li></ol></nav><div class="card"><div class="p-3 card-body"><nav class="" aria-label="pagination"><ul class="justify-content-between pagination pagination"><li class="page-item disabled"><a class="page-link page-previous" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks?page=0">‹‹ <!-- -->Previous<span class="sr-only"> <!-- -->Previous</span></a></li><li class="page-item disabled"><a class="page-link page-text">Page 1 of 54<!-- --> <span class="d-none d-sm-inline">• <!-- -->2664 Total</span></a></li><li class="page-item"><a class="page-link page-next" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks?page=2"><span class="sr-only">Next</span>Next<!-- --> ››</a></li></ul></nav><div class="table-responsive"><table class="results-table table"><thead><tr><th>ID</th><th>Name</th><th>Severity</th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/plugins/nessus/197514">197514</a></td><td>Oracle Solaris Critical Patch Update : apr2024_SRU11_3_36_33_1</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/193489">193489</a></td><td>Oracle Solaris Critical Patch Update : apr2024_SRU11_4_66_164_1</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/193488">193488</a></td><td>Oracle Solaris Critical Patch Update : apr2024_SRU11_4_54_138_1</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/189223">189223</a></td><td>Oracle Solaris Critical Patch Update : jan2024_SRU11_4_61_151_2</td><td><h6 class="m-1"><span class="badge badge-low">low</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/189222">189222</a></td><td>Oracle Solaris Critical Patch Update : jan2024_SRU11_4_63_157_1</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/183516">183516</a></td><td>Oracle Solaris Critical Patch Update : oct2023_SRU11_4_61_151_2</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/183515">183515</a></td><td>Oracle Solaris Critical Patch Update : oct2023_SRU11_4_62_151_3</td><td><h6 class="m-1"><span class="badge badge-low">low</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/183293">183293</a></td><td>Solaris 10 (sparc) : 150383-32</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/183292">183292</a></td><td>Solaris 10 (x86) : 151913-23</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/183291">183291</a></td><td>Solaris 10 (sparc) : 151912-23</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/178629">178629</a></td><td>Oracle Solaris Critical Patch Update : jul2023_SRU11_3_36_32_0</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/178628">178628</a></td><td>Oracle Solaris Critical Patch Update : jul2023_SRU11_4_59_144_2</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/178627">178627</a></td><td>Oracle Solaris Critical Patch Update : jul2023_SRU11_4_57_144_3</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/178626">178626</a></td><td>Oracle Solaris Critical Patch Update : jul2023_SRU11_4_58_144_3</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174477">174477</a></td><td>Oracle Solaris Critical Patch Update : apr2023_SRU11_3_36_31_0</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174476">174476</a></td><td>Oracle Solaris Critical Patch Update : apr2023_SRU11_4_56_138_2</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174475">174475</a></td><td>Oracle Solaris Critical Patch Update : apr2023_SRU11_4_55_138_3</td><td><h6 class="m-1"><span class="badge badge-low">low</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174474">174474</a></td><td>Oracle Solaris Critical Patch Update : apr2023_SRU11_4_46_119_2</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174473">174473</a></td><td>Oracle Solaris Critical Patch Update : apr2023_SRU11_4_54_138_1</td><td><h6 class="m-1"><span class="badge badge-low">low</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174329">174329</a></td><td>Solaris 10 (sparc) : 153153-07</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174328">174328</a></td><td>Solaris 10 (x86) : 153154-07</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174327">174327</a></td><td>Solaris 10 (sparc) : 151912-22</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174326">174326</a></td><td>Solaris 10 (sparc) : 150383-31</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/174325">174325</a></td><td>Solaris 10 (x86) : 151913-22</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172389">172389</a></td><td>Solaris 10 (x86) : 153154-06</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172388">172388</a></td><td>Solaris 10 (sparc) : 153153-06</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172387">172387</a></td><td>Solaris 10 (x86) : 153092-01</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172386">172386</a></td><td>Solaris 10 (x86) : 151913-21</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172385">172385</a></td><td>Solaris 10 (sparc) : 142397-02</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172384">172384</a></td><td>Solaris 10 (sparc) : 150383-30</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172383">172383</a></td><td>Solaris 10 (x86) : 142398-02</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172382">172382</a></td><td>Solaris 10 (x86) : 148420-04</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172381">172381</a></td><td>Solaris 10 (x86) : 119784-50</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172380">172380</a></td><td>Solaris 10 (sparc) : 119783-50</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172379">172379</a></td><td>Solaris 10 (sparc) : 151912-21</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172378">172378</a></td><td>Solaris 10 (sparc) : 153091-01</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/172377">172377</a></td><td>Solaris 10 (sparc) : 148419-04</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/170171">170171</a></td><td>Oracle Solaris Critical Patch Update : jan2023_SRU11_4_53_132_2</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/166386">166386</a></td><td>Oracle Solaris Critical Patch Update : oct2022_SRU11_4_49_126_2</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/166385">166385</a></td><td>Oracle Solaris Critical Patch Update : oct2022_SRU11_4_50_126_3</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/166384">166384</a></td><td>Oracle Solaris Critical Patch Update : oct2022_SRU11_4_48_126_1</td><td><h6 class="m-1"><span class="badge badge-low">low</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/163493">163493</a></td><td>Oracle Solaris Critical Patch Update : jul2022_SRU11_4_47_119_2</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/163492">163492</a></td><td>Oracle Solaris Critical Patch Update : jul2022_SRU11_4_45_119_2</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/163491">163491</a></td><td>Oracle Solaris Critical Patch Update : jul2022_SRU11_4_46_119_2</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/163490">163490</a></td><td>Oracle Solaris Critical Patch Update : jul2022_SRU11_4_42_113_1</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/159936">159936</a></td><td>Oracle Solaris Critical Patch Update : apr2022_SRU11_4_44_113_4</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/159935">159935</a></td><td>Oracle Solaris Critical Patch Update : apr2022_SRU11_4_42_113_1</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/159934">159934</a></td><td>Oracle Solaris Critical Patch Update : apr2022_SRU11_4_43_113_3</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/159891">159891</a></td><td>Solaris 10 (x86) : 151913-20</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/nessus/159890">159890</a></td><td>Solaris 10 (sparc) : 151912-20</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr></tbody></table></div><nav class="" aria-label="pagination"><ul class="justify-content-between pagination pagination"><li class="page-item disabled"><a class="page-link page-previous" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks?page=0">‹‹ <!-- -->Previous<span class="sr-only"> <!-- -->Previous</span></a></li><li class="page-item disabled"><a class="page-link page-text">Page 1 of 54<!-- --> <span class="d-none d-sm-inline">• <!-- -->2664 Total</span></a></li><li class="page-item"><a class="page-link page-next" href="https://www.tenable.com/plugins/nessus/families/Solaris%20Local%20Security%20Checks?page=2"><span class="sr-only">Next</span>Next<!-- --> ››</a></li></ul></nav></div></div></div></div></div></div><footer class="footer"><div class="container"><ul class="footer-nav"><li class="footer-nav-item"><a href="https://www.tenable.com/">Tenable.com</a></li><li class="footer-nav-item"><a href="https://community.tenable.com">Community & Support</a></li><li class="footer-nav-item"><a href="https://docs.tenable.com">Documentation</a></li><li class="footer-nav-item"><a href="https://university.tenable.com">Education</a></li></ul><ul class="footer-nav footer-nav-secondary"><li class="footer-nav-item">© <!-- -->2024<!-- --> <!-- -->Tenable®, Inc. All Rights Reserved</li><li class="footer-nav-item"><a href="https://www.tenable.com/privacy-policy">Privacy Policy</a></li><li class="footer-nav-item"><a href="https://www.tenable.com/legal">Legal</a></li><li class="footer-nav-item"><a href="https://www.tenable.com/section-508-voluntary-product-accessibility">508 Compliance</a></li></ul></div></footer><div class="Toastify"></div></div></div><script id="__NEXT_DATA__" type="application/json" nonce="nonce-MGZiM2NkMTktM2E5ZC00YmRkLWEyOWEtZGIzY2RjN2UxZjMx">{"props":{"pageProps":{"plugins":[{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"197514","_score":null,"_source":{"plugin_modification_date":"2024-05-20T00:00:00","references":[{"id_type":"cve","id":"CVE-2024-21059","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21059"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2024csaf.json"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2024.html"}],"description":"The version of Solaris installed on the remote host is prior to 11.3.36.33.1. It is, therefore, affected by a vulnerability as referenced in the solaris11_apr2024_SRU11_3_36_33_1 advisory.\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. (CVE-2024-21059)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.","risk_factor":"Medium","script_id":"197514","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Apr2024.","script_name":"Oracle Solaris Critical Patch Update : apr2024_SRU11_3_36_33_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Apr2024 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2024-05-20T00:00:00","cvss":{"cvssv3_score":7.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":6.8,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":4.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.5","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"5/20/2024","pluginModificationDate":"5/20/2024","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1716163200000,"197514"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"193489","_score":null,"_source":{"plugin_modification_date":"2024-04-18T00:00:00","references":[{"id_type":"cve","id":"CVE-2024-20999","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20999"},{"id_type":"cve","id":"CVE-2024-21105","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21105"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2024csaf.json"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2024.html"}],"description":"The version of Solaris installed on the remote host is prior to 11.4.66.164.1. It is, therefore, affected by multiple vulnerabilities as referenced in the solaris11_apr2024_SRU11_4_66_164_1 advisory.\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Zones). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. (CVE-2024-20999)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. (CVE-2024-21105)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.","risk_factor":"Medium","script_id":"193489","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Apr2024.","script_name":"Oracle Solaris Critical Patch Update : apr2024_SRU11_4_66_164_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Apr2024 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2024-04-18T00:00:00","cvss":{"cvssv3_score":8.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.5,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.5","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/18/2024","pluginModificationDate":"4/18/2024","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1713398400000,"193489"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"193488","_score":null,"_source":{"plugin_modification_date":"2024-04-18T00:00:00","references":[{"id_type":"cve","id":"CVE-2024-21059","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21059"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2024csaf.json"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2024.html"}],"description":"The version of Solaris installed on the remote host is prior to 11.4.54.138.1. It is, therefore, affected by a vulnerability as referenced in the solaris11_apr2024_SRU11_4_54_138_1 advisory.\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. (CVE-2024-21059)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.","risk_factor":"Medium","script_id":"193488","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Apr2024.","script_name":"Oracle Solaris Critical Patch Update : apr2024_SRU11_4_54_138_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Apr2024 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2024-04-18T00:00:00","cvss":{"cvssv3_score":7.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.5","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/18/2024","pluginModificationDate":"4/18/2024","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1713398400000,"193488"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"189223","_score":null,"_source":{"plugin_modification_date":"2024-01-19T00:00:00","references":[{"id_type":"IAVA","id":"2024-A-0036","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-20920","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20920"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujan2024csaf.json"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujan2024.html"}],"description":"The version of Solaris installed on the remote host is prior to 11.4.61.151.2. It is, therefore, affected by a vulnerability as referenced in the solaris11_jan2024_SRU11_4_61_151_2 advisory.\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. (CVE-2024-20920)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.","risk_factor":"Low","script_id":"189223","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Jan2024.","script_name":"Oracle Solaris Critical Patch Update : jan2024_SRU11_4_61_151_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Jan2024 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2024-01-19T00:00:00","cvss":{"cvssv3_score":3.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:P/I:N/A:N","cvssv3_temporal_score":3.3,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:P/I:N/A:N","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":1.3,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":1.7,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Low","cvssv4_risk_factor":null},"vpr_score":"1.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2024-A-0036"]},"pluginPublicationDate":"1/19/2024","pluginModificationDate":"1/19/2024","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Low","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1705622400000,"189223"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"189222","_score":null,"_source":{"plugin_modification_date":"2024-01-19T00:00:00","references":[{"id_type":"IAVA","id":"2024-A-0036","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-20946","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20946"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujan2024csaf.json"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujan2024.html"}],"description":"The version of Solaris installed on the remote host is prior to 11.4.63.157.1. It is, therefore, affected by a vulnerability as referenced in the solaris11_jan2024_SRU11_4_63_157_1 advisory.\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. (CVE-2024-20946)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.","risk_factor":"Medium","script_id":"189222","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Jan2024.","script_name":"Oracle Solaris Critical Patch Update : jan2024_SRU11_4_63_157_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Jan2024 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2024-01-19T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_temporal_score":4.8,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.6,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2024-A-0036"]},"pluginPublicationDate":"1/19/2024","pluginModificationDate":"1/19/2024","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1705622400000,"189222"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"183516","_score":null,"_source":{"plugin_modification_date":"2023-10-20T00:00:00","references":[{"id_type":"cve","id":"CVE-2023-22129","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22129"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuoct2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"}],"description":"The remote host is affected by a Denial of Service vulnerability which could be exploited by a low privileged attacker with logon to the infrastructure where Oracle Solaris executes.","risk_factor":"Medium","script_id":"183516","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Oct2023.","script_name":"Oracle Solaris Critical Patch Update : oct2023_SRU11_4_61_151_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Oct2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-10-20T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:S/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.8,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"10/20/2023","pluginModificationDate":"10/20/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1697760000000,"183516"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"183515","_score":null,"_source":{"plugin_modification_date":"2023-10-20T00:00:00","references":[{"id_type":"cve","id":"CVE-2023-22128","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22128"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuoct2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuoct2023.html"}],"description":"The remote host is affected by a difficult to exploit vulnerability which allows an unauthenticated attacker with network access via rquota to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and can result in unauthoraized read access to a subset of accessible data.","risk_factor":"Low","script_id":"183515","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU Oct2023.","script_name":"Oracle Solaris Critical Patch Update : oct2023_SRU11_4_62_151_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the Oct2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-10-20T00:00:00","cvss":{"cvssv3_score":3.1,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:H/Au:N/C:P/I:N/A:N","cvssv3_vector_base":"AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":2.6,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Low","cvssv4_risk_factor":null},"vpr_score":"1.4","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"10/20/2023","pluginModificationDate":"10/20/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Low","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1697760000000,"183515"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"183293","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/150383-32"}],"description":"SunOS 5.10: wanboot patch.\nDate this patch was last updated by Sun : Oct/16/23","risk_factor":"Medium","script_id":"183293","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 150383-32","script_name":"Solaris 10 (sparc) : 150383-32","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 150383-32 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-10-18T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"10/18/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"Medium"},"sort":[1697587200000,"183293"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"183292","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151913-23"}],"description":"SunOS 5.10_x86: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Oct/16/23","risk_factor":"High","script_id":"183292","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151913-23","script_name":"Solaris 10 (x86) : 151913-23","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151913-23 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-10-18T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"10/18/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1697587200000,"183292"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"183291","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151912-23"}],"description":"SunOS 5.10: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Oct/16/23","risk_factor":"High","script_id":"183291","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151912-23","script_name":"Solaris 10 (sparc) : 151912-23","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151912-23 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-10-18T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"10/18/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1697587200000,"183291"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"178629","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0370-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-22023","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22023"},{"id_type":"cve","id":"CVE-2023-31284","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31284"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2960446.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Device Driver Interface). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: CVE-2023-22023 is equivalent to CVE-2023-31284. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2023-22023)","risk_factor":"Medium","script_id":"178629","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2023.","script_name":"Oracle Solaris Critical Patch Update : jul2023_SRU11_3_36_32_0","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-07-20T00:00:00","cvss":{"cvssv3_score":7.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":6.8,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.8,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0370-S"]},"pluginPublicationDate":"7/20/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1689811200000,"178629"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"178628","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-31783","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31783"},{"id_type":"cve","id":"CVE-2022-37290","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37290"},{"id_type":"cve","id":"CVE-2022-37434","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434"},{"id_type":"cve","id":"CVE-2022-43551","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551"},{"id_type":"cve","id":"CVE-2023-0215","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215"},{"id_type":"cve","id":"CVE-2023-1999","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999"},{"id_type":"cve","id":"CVE-2023-21911","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21911"},{"id_type":"cve","id":"CVE-2023-21912","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21912"},{"id_type":"cve","id":"CVE-2023-21919","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21919"},{"id_type":"cve","id":"CVE-2023-21920","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21920"},{"id_type":"cve","id":"CVE-2023-21929","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21929"},{"id_type":"cve","id":"CVE-2023-21933","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21933"},{"id_type":"cve","id":"CVE-2023-21935","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21935"},{"id_type":"cve","id":"CVE-2023-21940","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21940"},{"id_type":"cve","id":"CVE-2023-21945","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21945"},{"id_type":"cve","id":"CVE-2023-21946","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21946"},{"id_type":"cve","id":"CVE-2023-21947","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21947"},{"id_type":"cve","id":"CVE-2023-21953","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21953"},{"id_type":"cve","id":"CVE-2023-21955","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21955"},{"id_type":"cve","id":"CVE-2023-21962","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21962"},{"id_type":"cve","id":"CVE-2023-21966","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21966"},{"id_type":"cve","id":"CVE-2023-21972","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21972"},{"id_type":"cve","id":"CVE-2023-21976","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21976"},{"id_type":"cve","id":"CVE-2023-21977","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21977"},{"id_type":"cve","id":"CVE-2023-21980","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21980"},{"id_type":"cve","id":"CVE-2023-21982","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21982"},{"id_type":"cve","id":"CVE-2023-24539","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539"},{"id_type":"cve","id":"CVE-2023-24540","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540"},{"id_type":"cve","id":"CVE-2023-25652","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652"},{"id_type":"cve","id":"CVE-2023-25815","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815"},{"id_type":"cve","id":"CVE-2023-26767","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26767"},{"id_type":"cve","id":"CVE-2023-26768","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26768"},{"id_type":"cve","id":"CVE-2023-26769","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26769"},{"id_type":"cve","id":"CVE-2023-2731","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2731"},{"id_type":"cve","id":"CVE-2023-28484","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484"},{"id_type":"cve","id":"CVE-2023-28709","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28709"},{"id_type":"cve","id":"CVE-2023-29007","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007"},{"id_type":"cve","id":"CVE-2023-29400","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400"},{"id_type":"cve","id":"CVE-2023-29469","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469"},{"id_type":"cve","id":"CVE-2023-30608","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608"},{"id_type":"cve","id":"CVE-2023-32324","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324"},{"id_type":"cve","id":"CVE-2023-34414","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414"},{"id_type":"cve","id":"CVE-2023-34416","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416"},{"id_type":"cve","id":"CVE-2023-34981","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34981"},{"id_type":"cve","id":"CVE-2023-3575","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3575"},{"id_type":"cve","id":"CVE-2023-41717","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41717"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2960446.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the MySQL Enterprise Monitor product of Oracle MySQL (component: Monitoring: General (Apache Tomcat)). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Enterprise Monitor. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Enterprise Monitor. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-28709)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).\n (CVE-2023-21980)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21946)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n (CVE-2023-21929)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21911)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).\n Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21962)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21919)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21933)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21972)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21966)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21920)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21935)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21945)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21976)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21977)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21982)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21953)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21955)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).\n Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21940)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).\n Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21947)\n\n - Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Virtual Network Function Manager (git)). The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Communications Diameter Signaling Router executes to compromise Oracle Communications Diameter Signaling Router. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Communications Diameter Signaling Router. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).\n (CVE-2023-29007)\n\n - Vulnerability in the MySQL Workbench product of Oracle MySQL (component: Workbench (libxml2)). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via MySQL Workbench to compromise MySQL Workbench. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Workbench. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).\n (CVE-2023-28484)\n\n - Vulnerability in the Oracle Retail Advanced Inventory Planning product of Oracle Retail Applications (component: Operations \u0026 Maintenance (zlib)). Supported versions that are affected are 15.0 and 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Advanced Inventory Planning. Successful attacks of this vulnerability can result in takeover of Oracle Retail Advanced Inventory Planning. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2022-37434)\n\n - Vulnerability in the Oracle Enterprise Operations Monitor product of Oracle Communications (component:\n Mediation Engine (OpenSSL)). Supported versions that are affected are 5.0 and 5.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Enterprise Operations Monitor. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Enterprise Operations Monitor. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-0215)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (cURL)). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n (CVE-2022-43551)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).\n Supported versions that are affected are 5.7.41 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21912)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).\n (CVE-2023-21980)\n\n - Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Virtual Network Function Manager (Libwebp)).\n The supported version that is affected is 8.6.0.0.\n Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Diameter Signaling Router. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-1999)","risk_factor":"Medium","script_id":"178628","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2023.","script_name":"Oracle Solaris Critical Patch Update : jul2023_SRU11_4_59_144_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-07-20T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P","cvssv3_temporal_score":8.8,"rating":null,"cvssv2_vector_base":"AV:N/AC:M/Au:N/C:N/I:N/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.3,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/20/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1689811200000,"178628"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"178627","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0370-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2021-43618","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618"},{"id_type":"cve","id":"CVE-2022-2097","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097"},{"id_type":"cve","id":"CVE-2022-21123","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"id_type":"cve","id":"CVE-2022-21125","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"id_type":"cve","id":"CVE-2022-21127","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"id_type":"cve","id":"CVE-2022-21166","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"id_type":"cve","id":"CVE-2022-21589","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21589"},{"id_type":"cve","id":"CVE-2022-21592","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21592"},{"id_type":"cve","id":"CVE-2022-21608","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21608"},{"id_type":"cve","id":"CVE-2022-21617","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21617"},{"id_type":"cve","id":"CVE-2022-28805","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28805"},{"id_type":"cve","id":"CVE-2022-33099","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33099"},{"id_type":"cve","id":"CVE-2022-39348","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39348"},{"id_type":"cve","id":"CVE-2022-40897","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897"},{"id_type":"cve","id":"CVE-2022-42898","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"},{"id_type":"cve","id":"CVE-2022-43551","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551"},{"id_type":"cve","id":"CVE-2022-43552","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"id_type":"cve","id":"CVE-2022-44617","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617"},{"id_type":"cve","id":"CVE-2022-44792","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44792"},{"id_type":"cve","id":"CVE-2022-44793","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44793"},{"id_type":"cve","id":"CVE-2022-46285","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285"},{"id_type":"cve","id":"CVE-2022-46663","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46663"},{"id_type":"cve","id":"CVE-2022-46908","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46908"},{"id_type":"cve","id":"CVE-2022-47016","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47016"},{"id_type":"cve","id":"CVE-2022-48303","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303"},{"id_type":"cve","id":"CVE-2022-4883","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883"},{"id_type":"cve","id":"CVE-2023-0494","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494"},{"id_type":"cve","id":"CVE-2023-1161","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161"},{"id_type":"cve","id":"CVE-2023-22023","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22023"},{"id_type":"cve","id":"CVE-2023-23931","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23931"},{"id_type":"cve","id":"CVE-2023-27320","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27320"},{"id_type":"cve","id":"CVE-2023-28486","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486"},{"id_type":"cve","id":"CVE-2023-28487","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487"},{"id_type":"cve","id":"CVE-2023-31284","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31284"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2960446.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Device Driver Interface). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: CVE-2023-22023 is equivalent to CVE-2023-31284. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2023-22023)\n\n - Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security (OpenSSL)). Supported versions that are affected are 8.58, 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise PeopleSoft Enterprise PeopleTools.\n Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).\n (CVE-2022-2097)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling).\n Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-21617)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-21608)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).\n Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n (CVE-2022-21592)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).\n Supported versions that are affected are 5.7.39 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n (CVE-2022-21589)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (cURL)). Supported versions that are affected are 5.7.41 and prior and 8.0.32 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n (CVE-2022-43551)\n\n - Vulnerability in the Oracle Communications Network Analytics Data Director product of Oracle Communications (component: Install/Upgrade (Kerberos)). The supported version that is affected is 23.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Network Analytics Data Director.\n Successful attacks of this vulnerability can result in takeover of Oracle Communications Network Analytics Data Director. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2022-42898)\n\n - Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Third Party (SQLite)). The supported version that is affected is 8.5.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Outside In Technology executes to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Outside In Technology accessible data as well as unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).\n (CVE-2022-46908)\n\n - Vulnerability in the Oracle Communications Diameter Signaling Router product of Oracle Communications (component: Platform (Microcode Controller)). The supported version that is affected is 8.6.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Diameter Signaling Router executes to compromise Oracle Communications Diameter Signaling Router. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Communications Diameter Signaling Router accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n (CVE-2022-21123)\n\n - Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Porting (Cryptography)). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise PeopleSoft Enterprise PeopleTools.\n Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).\n (CVE-2023-23931)\n\n - Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Porting (Python setuptools)). Supported versions that are affected are 8.59 and 8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools.\n CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-40897)","risk_factor":"Medium","script_id":"178627","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2023.","script_name":"Oracle Solaris Critical Patch Update : jul2023_SRU11_4_57_144_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-07-20T00:00:00","cvss":{"cvssv3_score":9.1,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P","cvssv3_temporal_score":8.4,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:N/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5.3,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.4,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0370-S"]},"pluginPublicationDate":"7/20/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1689811200000,"178627"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"178626","_score":null,"_source":{"plugin_modification_date":"2023-07-26T00:00:00","references":[{"id_type":"cve","id":"CVE-2021-33621","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33621"},{"id_type":"cve","id":"CVE-2022-41723","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723"},{"id_type":"cve","id":"CVE-2022-41724","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724"},{"id_type":"cve","id":"CVE-2022-41725","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725"},{"id_type":"cve","id":"CVE-2022-4743","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4743"},{"id_type":"cve","id":"CVE-2022-4904","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904"},{"id_type":"cve","id":"CVE-2023-1992","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992"},{"id_type":"cve","id":"CVE-2023-1993","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993"},{"id_type":"cve","id":"CVE-2023-1994","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994"},{"id_type":"cve","id":"CVE-2023-24021","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24021"},{"id_type":"cve","id":"CVE-2023-24532","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532"},{"id_type":"cve","id":"CVE-2023-24534","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534"},{"id_type":"cve","id":"CVE-2023-24536","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536"},{"id_type":"cve","id":"CVE-2023-24537","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537"},{"id_type":"cve","id":"CVE-2023-24538","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538"},{"id_type":"cve","id":"CVE-2023-28755","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28755"},{"id_type":"cve","id":"CVE-2023-28756","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28756"},{"id_type":"cve","id":"CVE-2023-31047","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31047"},{"id_type":"cve","id":"CVE-2023-32205","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205"},{"id_type":"cve","id":"CVE-2023-32206","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206"},{"id_type":"cve","id":"CVE-2023-32207","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207"},{"id_type":"cve","id":"CVE-2023-32211","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211"},{"id_type":"cve","id":"CVE-2023-32212","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212"},{"id_type":"cve","id":"CVE-2023-32213","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213"},{"id_type":"cve","id":"CVE-2023-32214","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32214"},{"id_type":"cve","id":"CVE-2023-32215","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215"},{"id_type":"cve","id":"CVE-2023-33657","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33657"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2960446.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :","risk_factor":"Critical","script_id":"178626","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2023.","script_name":"Oracle Solaris Critical Patch Update : jul2023_SRU11_4_58_144_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-07-20T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":8.8,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":7.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/20/2023","pluginModificationDate":"7/26/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1689811200000,"178626"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174477","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0215-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-21985","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21985"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2940069.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2023.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).\n (CVE-2023-21985)","risk_factor":"Medium","script_id":"174477","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2023.","script_name":"Oracle Solaris Critical Patch Update : apr2023_SRU11_3_36_31_0","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-19T00:00:00","cvss":{"cvssv3_score":7.7,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_temporal_score":6.7,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":4.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.5,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"7.3","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0215-S"]},"pluginPublicationDate":"4/19/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"High","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"High","severity":"Medium"},"sort":[1681862400000,"174477"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174476","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0215-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-21985","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21985"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2940069.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2023.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).\n (CVE-2023-21985)","risk_factor":"Medium","script_id":"174476","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2023.","script_name":"Oracle Solaris Critical Patch Update : apr2023_SRU11_4_56_138_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-19T00:00:00","cvss":{"cvssv3_score":7.7,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_temporal_score":6.7,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":4.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.5,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"7.3","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0215-S"]},"pluginPublicationDate":"4/19/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"High","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"High","severity":"Medium"},"sort":[1681862400000,"174476"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174475","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0215-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-21984","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21984"},{"id_type":"cve","id":"CVE-2023-22003","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22003"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2940069.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Libraries). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2023-21984)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.3 (Integrity impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).\n (CVE-2023-22003)","risk_factor":"Low","script_id":"174475","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2023.","script_name":"Oracle Solaris Critical Patch Update : apr2023_SRU11_4_55_138_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-19T00:00:00","cvss":{"cvssv3_score":3.3,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N","cvssv3_temporal_score":2.9,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:N/C:N/I:P/A:N","cvssv3_vector_base":"AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","cvssv4_vector":null,"cvssv2_temporal_score":1.6,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":2.1,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Low","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0215-S"]},"pluginPublicationDate":"4/19/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Low","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1681862400000,"174475"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174474","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0215-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-21896","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21896"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2940069.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2023.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in takeover of Oracle Solaris.\n CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2023-21896)","risk_factor":"Medium","script_id":"174474","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2023.","script_name":"Oracle Solaris Critical Patch Update : apr2023_SRU11_4_46_119_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-19T00:00:00","cvss":{"cvssv3_score":7,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":6.1,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":4.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0215-S"]},"pluginPublicationDate":"4/19/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1681862400000,"174474"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174473","_score":null,"_source":{"plugin_modification_date":"2023-11-16T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0215-S","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2023-21928","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21928"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2940069.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2023.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: IPS repository daemon). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 1.8 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N).\n (CVE-2023-21928)","risk_factor":"Low","script_id":"174473","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2023.","script_name":"Oracle Solaris Critical Patch Update : apr2023_SRU11_4_54_138_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-19T00:00:00","cvss":{"cvssv3_score":1.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:M/C:N/I:P/A:N","cvssv3_temporal_score":1.6,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:M/C:N/I:P/A:N","cvssv3_vector_base":"AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N","cvssv4_vector":null,"cvssv2_temporal_score":0.6,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":0.8,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Low","cvssv4_risk_factor":null},"vpr_score":"1.4","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0215-S"]},"pluginPublicationDate":"4/19/2023","pluginModificationDate":"11/16/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Low","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1681862400000,"174473"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174329","_score":null,"_source":{"plugin_modification_date":"2023-04-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153153-07"}],"description":"SunOS 5.10: kernel patch.\nDate this patch was last updated by Sun : Apr/13/23","risk_factor":"High","script_id":"174329","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153153-07","script_name":"Solaris 10 (sparc) : 153153-07","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153153-07 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-14T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/14/2023","pluginModificationDate":"4/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1681430400000,"174329"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174328","_score":null,"_source":{"plugin_modification_date":"2023-04-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153154-07"}],"description":"SunOS 5.10_x86: kernel patch.\nDate this patch was last updated by Sun : Apr/13/23","risk_factor":"High","script_id":"174328","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153154-07","script_name":"Solaris 10 (x86) : 153154-07","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153154-07 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-14T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/14/2023","pluginModificationDate":"4/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1681430400000,"174328"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174327","_score":null,"_source":{"plugin_modification_date":"2023-04-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151912-22"}],"description":"SunOS 5.10: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Apr/13/23","risk_factor":"High","script_id":"174327","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151912-22","script_name":"Solaris 10 (sparc) : 151912-22","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151912-22 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-14T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/14/2023","pluginModificationDate":"4/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1681430400000,"174327"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174326","_score":null,"_source":{"plugin_modification_date":"2023-04-14T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/150383-31"}],"description":"SunOS 5.10: wanboot patch.\nDate this patch was last updated by Sun : Apr/13/23","risk_factor":"Medium","script_id":"174326","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 150383-31","script_name":"Solaris 10 (sparc) : 150383-31","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 150383-31 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-14T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/14/2023","pluginModificationDate":"4/14/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"Medium"},"sort":[1681430400000,"174326"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"174325","_score":null,"_source":{"plugin_modification_date":"2023-04-18T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151913-22"}],"description":"SunOS 5.10_x86: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Apr/13/23","risk_factor":"High","script_id":"174325","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151913-22","script_name":"Solaris 10 (x86) : 151913-22","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151913-22 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-04-14T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/14/2023","pluginModificationDate":"4/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1681430400000,"174325"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172389","_score":null,"_source":{"plugin_modification_date":"2023-03-13T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21439","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21439"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153154-06"}],"description":"SunOS 5.10_x86: kernel patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"Medium","script_id":"172389","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153154-06","script_name":"Solaris 10 (x86) : 153154-06","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153154-06 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":4.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_temporal_score":3.7,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.3,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/13/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1678320000000,"172389"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172388","_score":null,"_source":{"plugin_modification_date":"2023-03-13T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21439","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21439"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153153-06"}],"description":"SunOS 5.10: kernel patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"Medium","script_id":"172388","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153153-06","script_name":"Solaris 10 (sparc) : 153153-06","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153153-06 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":4.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_temporal_score":3.7,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.3,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/13/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1678320000000,"172388"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172387","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153092-01"}],"description":"SunOS 5.10_x86: a2ps patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"High","script_id":"172387","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153092-01","script_name":"Solaris 10 (x86) : 153092-01","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153092-01 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172387"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172386","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151913-21"}],"description":"SunOS 5.10_x86: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Oct/17/22","risk_factor":"High","script_id":"172386","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151913-21","script_name":"Solaris 10 (x86) : 151913-21","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151913-21 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172386"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172385","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/142397-02"}],"description":"SunOS 5.10: libsasl.so.1 patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"High","script_id":"172385","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 142397-02","script_name":"Solaris 10 (sparc) : 142397-02","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 142397-02 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172385"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172384","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/150383-30"}],"description":"SunOS 5.10: wanboot patch.\nDate this patch was last updated by Sun : Oct/17/22","risk_factor":"Medium","script_id":"172384","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 150383-30","script_name":"Solaris 10 (sparc) : 150383-30","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 150383-30 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"Medium"},"sort":[1678320000000,"172384"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172383","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/142398-02"}],"description":"SunOS 5.10_x86: libsasl.so.1 patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"High","script_id":"172383","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 142398-02","script_name":"Solaris 10 (x86) : 142398-02","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 142398-02 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172383"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172382","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-23218","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"},{"id_type":"cve","id":"CVE-2022-23219","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"},{"id_type":"cve","id":"CVE-2023-21896","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21896"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/148420-04"}],"description":"SunOS 5.10_x86: nss_dns patch.\nDate this patch was last updated by Sun : Jan/16/23","risk_factor":"High","script_id":"172382","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 148420-04","script_name":"Solaris 10 (x86) : 148420-04","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 148420-04 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":9.1,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.5,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1678320000000,"172382"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172381","_score":null,"_source":{"plugin_modification_date":"2023-12-21T00:00:00","references":[{"id_type":"CWE","id":"16","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2007-2926","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926"},{"id_type":"cve","id":"CVE-2009-0696","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696"},{"id_type":"cve","id":"CVE-2013-0415","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0415"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/119784-50"}],"description":"Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Bind/Postinstall script for Bind package). The supported version that is affected is 10. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.","risk_factor":"Medium","script_id":"172381","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 119784-50","script_name":"Solaris 10 (x86) : 119784-50","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 119784-50 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":7,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Solaris Local Security Checks","xrefs":{"CWE":["16"]},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"12/21/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1678320000000,"172381"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172380","_score":null,"_source":{"plugin_modification_date":"2023-12-21T00:00:00","references":[{"id_type":"CWE","id":"16","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2007-2926","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926"},{"id_type":"cve","id":"CVE-2009-0696","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696"},{"id_type":"cve","id":"CVE-2013-0415","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0415"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/119783-50"}],"description":"Vulnerability in the Solaris component of Oracle Sun Products Suite (subcomponent: Bind/Postinstall script for Bind package). The supported version that is affected is 10. Very difficult to exploit vulnerability requiring logon to Operating System plus additional login/authentication to component or subcomponent. Successful attack of this vulnerability can escalate attacker privileges resulting in unauthorized Operating System takeover including arbitrary code execution.","risk_factor":"Medium","script_id":"172380","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 119783-50","script_name":"Solaris 10 (sparc) : 119783-50","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 119783-50 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_temporal_score":7,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Solaris Local Security Checks","xrefs":{"CWE":["16"]},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"12/21/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1678320000000,"172380"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172379","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151912-21"}],"description":"SunOS 5.10: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Oct/17/22","risk_factor":"High","script_id":"172379","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151912-21","script_name":"Solaris 10 (sparc) : 151912-21","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151912-21 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172379"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172378","_score":null,"_source":{"plugin_modification_date":"2023-03-09T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/153091-01"}],"description":"SunOS 5.10: a2ps patch.\nDate this patch was last updated by Sun : Jul/18/22","risk_factor":"High","script_id":"172378","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 153091-01","script_name":"Solaris 10 (sparc) : 153091-01","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 153091-01 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"3/9/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1678320000000,"172378"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"172377","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-23218","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"},{"id_type":"cve","id":"CVE-2022-23219","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"},{"id_type":"cve","id":"CVE-2023-21896","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21896"},{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/148419-04"}],"description":"SunOS 5.10: nss_dns patch.\nDate this patch was last updated by Sun : Jan/16/23","risk_factor":"High","script_id":"172377","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 148419-04","script_name":"Solaris 10 (sparc) : 148419-04","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 148419-04 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-03-09T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":9.1,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.5,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"3/9/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1678320000000,"172377"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"170171","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"IAVA","id":"2023-A-0046","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2021-46848","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848"},{"id_type":"cve","id":"CVE-2022-23218","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"},{"id_type":"cve","id":"CVE-2022-23219","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"},{"id_type":"cve","id":"CVE-2022-3204","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3204"},{"id_type":"cve","id":"CVE-2022-3276","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3276"},{"id_type":"cve","id":"CVE-2022-37797","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37797"},{"id_type":"cve","id":"CVE-2022-39253","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253"},{"id_type":"cve","id":"CVE-2022-39260","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260"},{"id_type":"cve","id":"CVE-2022-3970","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970"},{"id_type":"cve","id":"CVE-2022-41556","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41556"},{"id_type":"cve","id":"CVE-2022-43680","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680"},{"id_type":"cve","id":"CVE-2022-44638","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638"},{"id_type":"cve","id":"CVE-2022-45061","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061"},{"id_type":"cve","id":"CVE-2022-45063","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45063"},{"id_type":"cve","id":"CVE-2022-46872","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872"},{"id_type":"cve","id":"CVE-2022-46874","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874"},{"id_type":"cve","id":"CVE-2022-46875","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46875"},{"id_type":"cve","id":"CVE-2022-46878","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878"},{"id_type":"cve","id":"CVE-2022-46880","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880"},{"id_type":"cve","id":"CVE-2022-46881","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881"},{"id_type":"cve","id":"CVE-2022-46882","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882"},{"id_type":"cve","id":"CVE-2023-21900","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21900"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2920776.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujan2023cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujan2023.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Communications Session Border Controller product of Oracle Communications (component: Routing (glibc)). Supported versions that are affected are 8.4, 9.0 and 9.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Session Border Controller. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Session Border Controller as well as unauthorized update, insert or delete access to some of Oracle Communications Session Border Controller accessible data and unauthorized read access to a subset of Oracle Communications Session Border Controller accessible data. CVSS 3.1 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H).\n (CVE-2022-23219)\n\n - Vulnerability in the Oracle Communications Cloud Native Core Unified Data Repository product of Oracle Communications (component: Signaling (glibc)). The supported version that is affected is 22.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Cloud Native Core Unified Data Repository. Successful attacks of this vulnerability can result in takeover of Oracle Communications Cloud Native Core Unified Data Repository. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n (CVE-2022-23218)\n\n - Vulnerability in the Oracle Communications Cloud Native Core Policy product of Oracle Communications (component:\n Policy (GNU Libtasn1)). Supported versions that are affected are 22.4.0-22.4.4 and 23.1.0-23.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Communications Cloud Native Core Policy.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Communications Cloud Native Core Policy accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Communications Cloud Native Core Policy. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).\n (CVE-2021-46848)\n\n - Vulnerability in the Oracle Text (LibExpat) component of Oracle Database Server. Supported versions that are affected are 19.3-19.19 and 21.3-21.10. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Index privilege with network access via Oracle Net to compromise Oracle Text (LibExpat). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Text (LibExpat). CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-43680)\n\n - Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Porting (Python)). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools.\n CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-45061)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: NSSwitch). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:L).\n (CVE-2023-21900)","risk_factor":"High","script_id":"170171","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jan2023.","script_name":"Oracle Solaris Critical Patch Update : jan2023_SRU11_4_53_132_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jan2023 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2023-01-19T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":9.1,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.5,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2023-A-0046"]},"pluginPublicationDate":"1/19/2023","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1674086400000,"170171"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"166386","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0433","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-39401","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39401"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2900614.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuoct2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuoct2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-39401)","risk_factor":"Medium","script_id":"166386","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU oct2022.","script_name":"Oracle Solaris Critical Patch Update : oct2022_SRU11_4_49_126_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the oct2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-10-21T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_temporal_score":5.1,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.6,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0433"]},"pluginPublicationDate":"10/21/2022","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1666310400000,"166386"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"166385","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0433","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-39417","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39417"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2900614.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuoct2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuoct2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-39417)","risk_factor":"Medium","script_id":"166385","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU oct2022.","script_name":"Oracle Solaris Critical Patch Update : oct2022_SRU11_4_50_126_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the oct2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-10-21T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_temporal_score":5.1,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.6,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0433"]},"pluginPublicationDate":"10/21/2022","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1666310400000,"166385"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"166384","_score":null,"_source":{"plugin_modification_date":"2023-10-18T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0433","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-21610","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21610"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2900614.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuoct2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuoct2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: LDoms). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 3.3 (Confidentiality and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L).\n (CVE-2022-21610)","risk_factor":"Low","script_id":"166384","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU oct2022.","script_name":"Oracle Solaris Critical Patch Update : oct2022_SRU11_4_48_126_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the oct2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-10-21T00:00:00","cvss":{"cvssv3_score":3.3,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:H/Au:S/C:P/I:N/A:P","cvssv3_temporal_score":3.1,"rating":null,"cvssv2_vector_base":"AV:L/AC:H/Au:S/C:P/I:N/A:P","cvssv3_vector_base":"AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L","cvssv4_vector":null,"cvssv2_temporal_score":2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":2.4,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Low","cvssv4_risk_factor":null},"vpr_score":"2.5","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0433"]},"pluginPublicationDate":"10/21/2022","pluginModificationDate":"10/18/2023","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Low","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1666310400000,"166384"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"163493","_score":null,"_source":{"plugin_modification_date":"2022-12-09T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21533","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21533"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2880043.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: SMB Server). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-21533)","risk_factor":"Medium","script_id":"163493","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2022.","script_name":"Oracle Solaris Critical Patch Update : jul2022_SRU11_4_47_119_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-07-27T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_temporal_score":4.8,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:S/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.6,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/27/2022","pluginModificationDate":"12/9/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1658880000000,"163493"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"163492","_score":null,"_source":{"plugin_modification_date":"2022-12-09T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21524","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21524"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2880043.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via SMB to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris as well as unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).\n (CVE-2022-21524)","risk_factor":"High","script_id":"163492","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2022.","script_name":"Oracle Solaris Critical Patch Update : jul2022_SRU11_4_45_119_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-07-27T00:00:00","cvss":{"cvssv3_score":7.6,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C","cvssv3_temporal_score":6.6,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:S/C:P/I:P/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5.9,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":8,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"4.7","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/27/2022","pluginModificationDate":"12/9/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1658880000000,"163492"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"163491","_score":null,"_source":{"plugin_modification_date":"2022-12-09T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21514","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21514"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2880043.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Remote Administration Daemon). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-21514)","risk_factor":"High","script_id":"163491","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2022.","script_name":"Oracle Solaris Critical Patch Update : jul2022_SRU11_4_46_119_2","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-07-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_temporal_score":6.5,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5.8,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.8,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/27/2022","pluginModificationDate":"12/9/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1658880000000,"163491"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"163490","_score":null,"_source":{"plugin_modification_date":"2022-12-09T00:00:00","references":[{"id_type":"cve","id":"CVE-2022-21439","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21439"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2880043.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpujul2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"description":"This Solaris system is missing necessary patches to address a critical security update :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).\n (CVE-2022-21439)","risk_factor":"Medium","script_id":"163490","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU jul2022.","script_name":"Oracle Solaris Critical Patch Update : jul2022_SRU11_4_42_113_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the jul2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-07-27T00:00:00","cvss":{"cvssv3_score":4.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_temporal_score":3.7,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:M/C:N/I:N/A:C","cvssv3_vector_base":"AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":3.2,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":4.3,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"7/27/2022","pluginModificationDate":"12/9/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1658880000000,"163490"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"159936","_score":null,"_source":{"plugin_modification_date":"2022-08-11T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0175","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-21493","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21493"},{"id_type":"cve","id":"CVE-2022-21494","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21494"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2857179.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.9 (Availability impacts).\n CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H).\n (CVE-2022-21493)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.0 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H).\n (CVE-2022-21494)","risk_factor":"Low","script_id":"159936","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2022.","script_name":"Oracle Solaris Critical Patch Update : apr2022_SRU11_4_44_113_4","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-04-20T00:00:00","cvss":{"cvssv3_score":5.9,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P","cvssv3_temporal_score":5.2,"rating":null,"cvssv2_vector_base":"AV:L/AC:M/Au:N/C:N/I:N/A:P","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":1.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":1.9,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"4.4","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0175"]},"pluginPublicationDate":"4/20/2022","pluginModificationDate":"8/11/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Low"},"sort":[1650412800000,"159936"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"159935","_score":null,"_source":{"plugin_modification_date":"2022-08-11T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0175","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-21416","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21416"},{"id_type":"cve","id":"CVE-2022-21446","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21446"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2857179.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data.\n CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N).\n (CVE-2022-21416)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris.\n Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data as well as unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).\n (CVE-2022-21446)","risk_factor":"Medium","script_id":"159935","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2022.","script_name":"Oracle Solaris Critical Patch Update : apr2022_SRU11_4_42_113_1","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-04-20T00:00:00","cvss":{"cvssv3_score":8.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N","cvssv3_temporal_score":7.1,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:P/A:N","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","cvssv4_vector":null,"cvssv2_temporal_score":4.7,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.4,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"4.2","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0175"]},"pluginPublicationDate":"4/20/2022","pluginModificationDate":"8/11/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1650412800000,"159935"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"159934","_score":null,"_source":{"plugin_modification_date":"2022-08-11T00:00:00","references":[{"id_type":"IAVA","id":"2022-A-0175","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2022-21461","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21461"},{"id_type":"cve","id":"CVE-2022-21463","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21463"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.oracle.com/epmos/faces/DocumentDisplay?id=2857179.1"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/docs/tech/security-alerts/cpuapr2022cvrf.xml"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"}],"description":"This Solaris system is missing necessary patches to address critical security updates :\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Solaris accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\n (CVE-2022-21461)\n\n - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n (CVE-2022-21463)","risk_factor":"Low","script_id":"159934","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote Solaris system is missing a security patch from CPU apr2022.","script_name":"Oracle Solaris Critical Patch Update : apr2022_SRU11_4_43_113_3","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install the apr2022 CPU from the Oracle support website.","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-04-20T00:00:00","cvss":{"cvssv3_score":5.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N","cvssv3_temporal_score":4.8,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:N/C:P/I:N/A:N","cvssv3_vector_base":"AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":1.6,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":2.1,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Solaris Local Security Checks","xrefs":{"IAVA":["2022-A-0175"]},"pluginPublicationDate":"4/20/2022","pluginModificationDate":"8/11/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1650412800000,"159934"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"159891","_score":null,"_source":{"plugin_modification_date":"2022-04-19T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151913-20"}],"description":"SunOS 5.10_x86: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Apr/19/22","risk_factor":"High","script_id":"159891","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151913-20","script_name":"Solaris 10 (x86) : 151913-20","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151913-20 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-04-19T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/19/2022","pluginModificationDate":"4/19/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1650326400000,"159891"]},{"_index":"1730133371790_plugin_en_us_nessus","_type":"_doc","_id":"159890","_score":null,"_source":{"plugin_modification_date":"2022-04-19T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"https://getupdates.oracle.com/readme/151912-20"}],"description":"SunOS 5.10: OpenSSL 1.0.2 patch.\nDate this patch was last updated by Sun : Apr/19/22","risk_factor":"High","script_id":"159890","available_languages":["ja_JP","zh_CN","zh_TW","en_US"],"synopsis":"The remote host is missing Sun Security Patch number 151912-20","script_name":"Solaris 10 (sparc) : 151912-20","language_code":"en_US","supported_sensors":[{"label":"Nessus","value":"nessus"}],"solution":"Install patch 151912-20 or higher","plugin_type":"local","sensor":"nessus","plugin_publication_date":"2022-04-19T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Solaris Local Security Checks","xrefs":{},"pluginPublicationDate":"4/19/2022","pluginModificationDate":"4/19/2022","locale":"en","availableLocales":["ja","zh-CN","zh-TW","en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1650326400000,"159890"]}],"total":2664,"type":"nessus","family":"Solaris Local Security Checks","page":1,"apiUrl":"https://www.tenable.com/plugins/api/v1/nessus/families/Solaris%20Local%20Security%20Checks?page=1"},"cookies":{},"user":null,"flash":null,"env":{"baseUrl":"https://www.tenable.com","host":"www.tenable.com","ga4TrackingId":""},"isUnsupportedBrowser":true,"__N_SSP":true},"page":"/plugins/[type]/families/[family]","query":{"type":"nessus","family":"Solaris Local Security Checks"},"buildId":"l4vcnKDxIXiOkUtvMoFnX","isFallback":false,"isExperimentalCompile":false,"gssp":true,"appGip":true,"locale":"en","locales":["en","de","es","fr","ja","ko","zh-CN","zh-TW"],"defaultLocale":"en","domainLocales":[{"domain":"www.tenable.com","defaultLocale":"en"},{"domain":"de.tenable.com","defaultLocale":"de"},{"domain":"es-la.tenable.com","defaultLocale":"es"},{"domain":"fr.tenable.com","defaultLocale":"fr"},{"domain":"jp.tenable.com","defaultLocale":"ja"},{"domain":"kr.tenable.com","defaultLocale":"ko"},{"domain":"www.tenablecloud.cn","defaultLocale":"zh-CN"},{"domain":"zh-tw.tenable.com","defaultLocale":"zh-TW"}],"scriptLoader":[]}</script></body></html>