Input validation error in Oracle Solaris - CVE-2015-4820
Published: October 22, 2015 / Updated: August 9, 2020
Oracle Solaris
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4907.