CVE-2007-4427
https://notcve.org/view.php?id=CVE-2007-4427
Unspecified vulnerability in the login page redirection logic in the Cache' Server Page (CSP) implementation in InterSystems Cache' 2007.1.0.369.0 and 2007.1.1.420.0 allows remote authenticated users to modify data on a server, related to encoding of certain parameter values by this redirection logic, aka MAK2116. Vulnerabilidad no especificada en la página de redirección de login en la implementación Cache' Server Page (CSP) en InterSystems Cache' 2007.1.0.369.0 y 2007.1.1.420.0 permite a usuarios validados remotos modificar datos sobre un servidor, relacionado con la codificación de ciertos valores de parámetros a través de esta redirección lógica, también conocida como MAK2116. • http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/57d7c80dde26fda3/7845e246da5b095b http://osvdb.org/40178 http://secunia.com/advisories/26541 http://www.intersystems.com/support/cflash/2007announce.html •
CVE-2007-0437
https://notcve.org/view.php?id=CVE-2007-0437
Multiple cross-site scripting (XSS) vulnerabilities in the sample Cache' Server Page (CSP) scripts in InterSystems Cache' allow remote attackers to inject arbitrary web script or HTML via (1) the TO parameter to loop.csp, (2) the VALUE parameter to cookie.csp, and (3) the PAGE parameter to showsource.csp in csp/samples/; and allow remote authenticated users to inject arbitrary web script or HTML via (4) the ERROR parameter to csp/samples/xmlclasseserror.csp, and unspecified vectors in (5) object.csp and (6) lotteryhistory.csp in csp/samples/. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en las secuencias de comandos ejemplo de Cache' Server Page (CSP) en InterSystems Cache' permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del (1) parámetro TO en loop.csp, (2) el parámetro VALUE en cookie.csp, y (3) el parámetro PAGE en showsource.csp en csp/samples/; y permite a usuarios remotos validados inyectar secuencias de comandos web o HTML a través del (4) parámetro ERROR en csp/samples/xmlclasseserror.csp, y vectores no especificados en (5) object.csp y (6) lotteryhistory.csp en csp/samples/. • http://www.cpni.gov.uk/Products/alerts/2928.aspx http://www.mwrinfosecurity.com/advisories/mwri_cache-sample-files-xss-advisory_2007-04-04.pdf http://www.mwrinfosecurity.com/news/1658.html •
CVE-2004-2684
https://notcve.org/view.php?id=CVE-2004-2684
Unspecified vulnerability in the %template package in InterSystems Cache' 5.0 allows attackers to access certain files on a server, including (1) cache.key and (2) cache.dat, related to .csp files under (a) Dev\studio\templates and (b) Devuser\studio\templates. • http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/7af3237a57e97f14/da52318590c68c75 http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/cda052864061faf7/b1c4ad61ca27c514 •
CVE-2003-1333
https://notcve.org/view.php?id=CVE-2003-1333
Unspecified vulnerability in the Cache' Server Page (CSP) implementation in InterSystems Cache' 4.0.3 through 5.0.5 allows remote attackers to "gain complete control" of a server. • http://groups.google.com/group/intersystems-public-cache/browse_thread/thread/8bdc0e496226edd1/60e9179edb4a4d43 •
CVE-2003-0497 – InterSystems Cache 4.1.15/5.0.x - Insecure Default Permissions
https://notcve.org/view.php?id=CVE-2003-0497
Caché Database 5.x installs /cachesys/bin/cache with world-writable permissions, which allows local users to gain privileges by modifying cache and executing it via cuxs. Cach? Database 5.x instala /cachesys/bin/cache con permisos de escritura global, lo que permite que usuarios locales obtengan privilegios modificando la caché y ejecutándolo mediante cuxs. • https://www.exploit-db.com/exploits/22847 http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=7 https://www.intersystems.com/support-learning/support/product-news-alerts/support-alerts-2003 • CWE-264: Permissions, Privileges, and Access Controls •