Solaris
by Sun
Review your setup
Solaris has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
33.3%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
50.0%
Based on 6 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2003-0466 | 9.8 | 90.8% | — |
| CVE-1999-1588 | 9.8 | 18.2% | — |
| CVE-2002-0391 | 9.8 | 8.3% | — |
| CVE-1999-0022 | 7.8 | 0.2% | — |
| CVE-2005-0109 | 5.6 | 0.1% | — |
| CVE-1999-0038 | 8.4 | 0.1% | — |
47
/ 100
moderate-risk
Active Threat
19/50 · Low
Exploit Availability
28/50 · Moderate
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.