2 results (0.003 seconds)

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 5

Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en (1) WSAdminServer y (2) WSWebServer en Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 y anteriores permite a atacantes remotos con privilegios webstar obtener privilegios de root mediante una librería de ayuda libucache.dylib maliciosa en el directorio de trabajo actual. • https://www.exploit-db.com/exploits/2788 http://secunia.com/advisories/22906 http://securityreason.com/securityalert/1921 http://securitytracker.com/id?1017239 http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt http://www.osvdb.org/30450 http://www.securityfocus.com/archive/1/451832/100/200/threaded http://www.securityfocus.com/bid/21123 http://www.vupen.com/english/advisories/2006/4539 https://exchange.xforce.ibmcloud.com/vulnerabilities/30308 •

CVSS: 5.0EPSS: 7%CPEs: 2EXPL: 2

Buffer overflow in the Tomcat plugin in 4d WebSTAR 5.33 and 5.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL. • https://www.exploit-db.com/exploits/25626 http://marc.info/?l=bugtraq&m=111541709402784&w=2 http://secunia.com/advisories/15278 http://www.osvdb.org/16154 http://www.securityfocus.com/bid/13538 https://exchange.xforce.ibmcloud.com/vulnerabilities/20478 •