{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T13:45:53.827","vulnerabilities":[{"cve":{"id":"CVE-2006-4306","sourceIdentifier":"cve@mitre.org","published":"2006-08-23T19:04:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Sun Solaris 8 and 9 before 20060821 allows local users to execute arbitrary commands via unspecified vectors, involving the default Role-Based Access Control (RBAC) settings in the \"File System Management\" profile."},{"lang":"es","value":"Vulnerabilidad no especificada en Sun Solaris 8 y 9 versiones anteriores a 20060821 permite a atacantes remotos ejecutar sentencias de su elección mediante vectores sin especificar, involucrando la configuración del Control de Acceso por defecto basado en rol (RBAC) en el perfil \"File System Management\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*","matchCriteriaId":"1894C542-AA81-40A9-BF47-AE24C93C1ACB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*","matchCriteriaId":"A711CDC2-412C-499D-9FA6-7F25B06267C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*","matchCriteriaId":"0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"http://secunia.com/advisories/21581","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/22295","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1016726","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102514-1","source":"cve@mitre.org"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/19643","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/3355","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28551","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1527","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/21581","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/22295","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1016726","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102514-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/19643","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/3355","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28551","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1527","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}