Total vulnerabilities in the database
The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations.
Software | From | Fixed in |
---|---|---|
sun / cluster | 2.0 | 2.0.x |