12 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

The default configuration of Sun Java System Application Server 7 and 7 2004Q2 enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398. La configuración por defecto de Sun Java System Application Server v7 y v7 2004Q2 activa el método HTTP TRACE, lo que provoca que sea mas sencillo para un atacante remoto robar las cookies y credenciales de autenticación a través de un ataque de seguimiento de trazas en sitios cruzados (XST), está relacionado con CVE-2004-2763 y CVE-2005-3398. • http://sunsolve.sun.com/search/document.do?assetkey=1-66-200942-1 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in Sun Java System Application Server 7 2004Q2 before Update 6, Web Server 6.1 before SP8, and Web Server 7.0 before Update 1 allows remote attackers to obtain source code of JSP files via unknown vectors. Vulnerabilidad no especificada en Java System Application Server versión 7 2004Q2 anterior a Update 6, Web Server versión 6.1 anterior a SP8 y and Web Server versión 7.0 anterior a Update 1 permite a atacantes remotos obtener el código fuente de los ficheros JSP mediante vectores no conocidos. • http://secunia.com/advisories/30122 http://sunsolve.sun.com/search/document.do?assetkey=1-26-201255-1 http://www.securityfocus.com/bid/29088 http://www.securitytracker.com/id?1019985 http://www.securitytracker.com/id?1019986 http://www.vupen.com/english/advisories/2008/1457/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42266 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 2%CPEs: 21EXPL: 0

Sun Java System Application Server and Web Server 7.0 through 9.0 before 20070710 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute an arbitrary Java method via a crafted stylesheet, a related issue to CVE-2007-3716. Sun Java System Application Server y Web Server versiones 7.0 hasta 9.0 anterior al 20070710, no procesan apropiadamente las hojas de estilo XSLT en las transformaciones de XSLT en firmas XML, lo que permite a atacantes dependiendo del contexto ejecutar un método Java arbitrario por medio de una hoja de estilo diseñada, un problema relacionado con CVE-2007-3716. • http://osvdb.org/37248 http://secunia.com/advisories/26023 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102992-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200054-1 http://www.isecpartners.com/advisories/2007-04-dsig.txt http://www.isecpartners.com/files/XMLDSIG_Command_Injection.pdf http://www.securityfocus.com/archive/1/473552/100/0/threaded http://www.securityfocus.com/archive/1/473553/100/0/threaded http://www.securityfocus.com/bid/24850 http& • CWE-20: Improper Input Validation •

CVSS: 6.8EPSS: 1%CPEs: 8EXPL: 0

HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors. Vulnerabilidad de contrabando de petición HTTP en Sun Java System Proxy Server anterior al 30/11/2006, cuando se usa con Sun Java System Application Server o Sun Java System Web Server, permite a atacantes remotos evitar el filtrado de petición HTTP, secuestrar sesiones web, realizar ataques de secuencias de comandos en sitios cruzados (XSS), y falsear la caché web mediante vectores de ataque no especificados. • http://secunia.com/advisories/23186 http://securitytracker.com/id?1017322 http://securitytracker.com/id?1017323 http://securitytracker.com/id?1017324 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 http://www.securityfocus.com/bid/21371 http://www.vupen.com/english/advisories/2006/4793 https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVSS: 4.0EPSS: 0%CPEs: 25EXPL: 0

Sun Java System Application Server (SJSAS) 7 through 8.1 and Web Server (SJSWS) 6.0 and 6.1 allows remote authenticated users to read files outside of the "document root directory" via a direct request using a UTF-8 encoded URI. Sun Java System Application Server (SJSAS) 7 hasta la 8.1 y Web Server (SJSWS) 6.0 y 6.1 permite a usuarios remotos validados leer archivos fuera del "directorio de documentos del root" a través de respuesta directas utilizando una codificación URI UTF-8. • http://secunia.com/advisories/21251 http://secunia.com/advisories/22425 http://securitytracker.com/id?1016596 http://securitytracker.com/id?1016597 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102521-1 http://support.avaya.com/elmodocs2/security/ASA-2006-204.htm http://www.securityfocus.com/bid/19200 http://www.vupen.com/english/advisories/2006/3020 https://exchange.xforce.ibmcloud.com/vulnerabilities/28061 •