
CVE-2004-2763
https://notcve.org/view.php?id=CVE-2004-2763
01 Jun 2009 — The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting. La configuración por defecto de Sun ONE/iPlanet Web Server v4.1 SP! al SP2 y v6.0 SP1 al SP5 responde a las peticiones HTTP TRACE, lo que puede permitir a atacantes remotos el robo de información usando ataques de seguimi... • http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html • CWE-16: Configuration •

CVE-2007-0183 – iPlanet Web Server 4.1 - Search Module Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2007-0183
11 Jan 2007 — Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en /search en iPlanet Web Server 4.x permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro NS-max-records. NOTA: El ... • https://www.exploit-db.com/exploits/29439 •

CVE-2002-1042 – iPlanet Web Server 4.1 - Search Component File Disclosure
https://notcve.org/view.php?id=CVE-2002-1042
31 Aug 2002 — Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter. • https://www.exploit-db.com/exploits/21603 •

CVE-2001-0606
https://notcve.org/view.php?id=CVE-2001-0606
27 Jul 2001 — Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service. • http://archives.neohapsis.com/archives/hp/2001-q1/0041.html •