CVE-2006-4289
https://notcve.org/view.php?id=CVE-2006-4289
Buffer overflow in Sony VAIO Media Server 2.x, 3.x, 4.x, and 5.x before 20060626 allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento de búfer en Sony VAIO Media Server 2.x, 3.x, 4.x, y 5.x anteriores al 26/06/1006 permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://kb.sony-europe.com/kb/solutions/en/V00000_V00499/v00246.html http://secunia.com/advisories/21512 http://www.css.ap.sony.com/VAIO/Website/General/ImportantNotices.aspx?Section=SN&file=/vaio/importantnotice/security_notice/SecurityNotice_VMIS.htm http://www.pentest.co.uk/documents/ptl-2006-02.html http://www.securityfocus.com/bid/19561 http://www.vupen.com/english/advisories/2006/3287 https://exchange.xforce.ibmcloud.com/vulnerabilities/28423 •
CVE-2006-4290
https://notcve.org/view.php?id=CVE-2006-4290
Directory traversal vulnerability in Sony VAIO Media Server 2.x, 3.x, 4.x, and 5.x before 20060626 allows remote attackers to gain sensitive information via unspecified vectors. Vulnerabilidad de salto de directorio en Sony VAIO Media Server 2.x, 3.x, 4.x, y 5.x anteriores al 26/06/2006 permite a atacantes remotos obtener información sensible a través de vectores no especificados. • http://kb.sony-europe.com/kb/solutions/en/V00000_V00499/v00246.html http://secunia.com/advisories/21512 http://www.pentest.co.uk/documents/ptl-2006-02.html http://www.securityfocus.com/bid/19560 http://www.vupen.com/english/advisories/2006/3287 https://exchange.xforce.ibmcloud.com/vulnerabilities/28424 •
CVE-2006-4235
https://notcve.org/view.php?id=CVE-2006-4235
Buffer overflow in the import project functionality in Sony SonicStage Mastering Studio 1.1.00 through 2.2.01 allows remote attackers to execute arbitrary code via a crafted SMP file. Desbordamiento de búfer en la funcionalidad de importación de proyecto en Sony SonicStage Mastering Studio 1.1.00 hasta 2.2.01 permite a atacantes remotos ejecutar código de su elección mediante un archivo SMP manipulado. • http://kb.sony-europe.com/KB/Solutions/EN/V00000_V00499/v00244.html http://secunia.com/advisories/21510 http://www.kb.cert.org/vuls/id/697761 http://www.osvdb.org/27966 http://www.pentest.co.uk/documents/ptl-2006-01.html http://www.securityfocus.com/bid/19558 http://www.vupen.com/english/advisories/2006/3286 https://exchange.xforce.ibmcloud.com/vulnerabilities/28421 •
CVE-2006-0671 – Sony/Ericsson Bluetooth - Reset Display Denial of Service
https://notcve.org/view.php?id=CVE-2006-0671
Buffer overflow in Sony Ericsson K600i, V600i, W800i, and T68i cell phone allows remote attackers to cause a denial of service (reboot or shutdown) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet whose length field is less than the actual length of the packet. Desbordamiento de búfer en teléfonos móviles Sony Ericsson K600i, V600i, W800i y T68i permite a atacantes remotos provocar una denegación de servicio (reinicio o apagado) a través de una conexión inalámbrica de Bluetooth a través de un paquete Logical Link Control and Adaptation Protocol (L2CAP) malformado cuya longitud de campo es menor que la longitud actual del paquete. • https://www.exploit-db.com/exploits/1473 http://marc.info/?l=bugtraq&m=113926179907655&w=2 http://marc.info/?l=full-disclosure&m=113924661724270&w=2 http://secunia.com/advisories/18747 http://www.secuobs.com/news/05022006-bluetooth7.shtml#english http://www.securityfocus.com/bid/16512 http://www.vupen.com/english/advisories/2006/0478 https://exchange.xforce.ibmcloud.com/vulnerabilities/24534 •
CVE-2005-3474
https://notcve.org/view.php?id=CVE-2005-3474
The aries.sys driver in Sony First4Internet XCP DRM software hides any file, registry key, or process with a name that starts with "$sys$", which allows attackers to hide activities on a system that uses XCP. • http://secunia.com/advisories/17408 http://securitytracker.com/id?1015145 http://www.osvdb.org/20435 http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html •