5 results (0.011 seconds)

CVSS: 2.4EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Oracle Sun Java System Application Server 8.0, 8.1, and 8.2; and GlassFish Enterprise Server 2.1.1; allows local users to affect confidentiality and integrity, related to the GUI. Vulnerabilidad no especificada en Oracle Sun Java System Application Server v8.0, v8.1, y v8.2; y GlassFish Enterprise Server v2.1.1; permite a usuarios locales afectar la confidencialidad e integridad, relacionado con el GUI. • http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html •

CVSS: 6.8EPSS: 1%CPEs: 8EXPL: 0

HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors. Vulnerabilidad de contrabando de petición HTTP en Sun Java System Proxy Server anterior al 30/11/2006, cuando se usa con Sun Java System Application Server o Sun Java System Web Server, permite a atacantes remotos evitar el filtrado de petición HTTP, secuestrar sesiones web, realizar ataques de secuencias de comandos en sitios cruzados (XSS), y falsear la caché web mediante vectores de ataque no especificados. • http://secunia.com/advisories/23186 http://securitytracker.com/id?1017322 http://securitytracker.com/id?1017323 http://securitytracker.com/id?1017324 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 http://www.securityfocus.com/bid/21371 http://www.vupen.com/english/advisories/2006/4793 https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVSS: 4.0EPSS: 0%CPEs: 25EXPL: 0

Sun Java System Application Server (SJSAS) 7 through 8.1 and Web Server (SJSWS) 6.0 and 6.1 allows remote authenticated users to read files outside of the "document root directory" via a direct request using a UTF-8 encoded URI. Sun Java System Application Server (SJSAS) 7 hasta la 8.1 y Web Server (SJSWS) 6.0 y 6.1 permite a usuarios remotos validados leer archivos fuera del "directorio de documentos del root" a través de respuesta directas utilizando una codificación URI UTF-8. • http://secunia.com/advisories/21251 http://secunia.com/advisories/22425 http://securitytracker.com/id?1016596 http://securitytracker.com/id?1016597 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102521-1 http://support.avaya.com/elmodocs2/security/ASA-2006-204.htm http://www.securityfocus.com/bid/19200 http://www.vupen.com/english/advisories/2006/3020 https://exchange.xforce.ibmcloud.com/vulnerabilities/28061 •

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting (XSS) vulnerability in Sun ONE Application Server 7 before Update 9, Java System Application Server 7 2004Q2 before Update 5, and Java System Application Server Enterprise Edition 8.1 2005 Q1 allows remote attackers to inject arbitrary HTML or web script via unknown vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sun ONE Application Server v7 anterior a actualización v9, Java System Application Server v7 2004Q2 anterior a actualización v5, y Java System Application Server Enterprise Edition v8.1 2005 Q1 permite a atacantes remotos inyecatr código HTML o web a través de vectores desconocidos. • http://secunia.com/advisories/20835 http://securitytracker.com/id?1016378 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102479-1 http://www.securityfocus.com/bid/18635 http://www.vupen.com/english/advisories/2006/2508 https://exchange.xforce.ibmcloud.com/vulnerabilities/27392 •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in Reverse SSL Proxy Plug-in for Sun Java System Application Server Standard Edition 7 2004Q2, Application Server Enterprise Edition 8.1 2005Q1, and Sun ONE Application Server 7 Standard Edition, as used in multiple web servers, allows remote attackers to conduct man-in-the-middle (MITM) attacks and "compromise data privacy." • http://secunia.com/advisories/17873 http://securitytracker.com/id?1015312 http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102012-1 http://www.securityfocus.com/bid/15728 http://www.vupen.com/english/advisories/2005/2753 •