CVE-2004-2374 – Working Resources BadBlue Server 2.40 - 'PHPtest.php' Full Path Disclosure
https://notcve.org/view.php?id=CVE-2004-2374
BadBlue 2.4 allows remote attackers to obtain the location of the server installation path via a request for phptest.php, which includes the pathname in the source of the resulting HTML. • https://www.exploit-db.com/exploits/23753 http://www.securityfocus.com/archive/1/355109 http://www.securityfocus.com/bid/9737 https://exchange.xforce.ibmcloud.com/vulnerabilities/15311 •
CVE-2004-1727 – BadBlue 2.52 Web Server - Multiple Connections Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2004-1727
BadBlue 2.5 allows remote attackers to cause a denial of service (refuse HTTP connections) via a large number of connections from the same IP address. • https://www.exploit-db.com/exploits/419 http://marc.info/?l=bugtraq&m=109309119502208&w=2 http://secunia.com/advisories/12346 http://www.gulftech.org/?node=research&article_id=00043-08202004 http://www.securityfocus.com/bid/10983 https://exchange.xforce.ibmcloud.com/vulnerabilities/17064 •
CVE-2003-0332 – Working Resources BadBlue 1.7.x/2.x - Unauthorized HTS Access
https://notcve.org/view.php?id=CVE-2003-0332
The ISAPI extension in BadBlue 1.7 through 2.2, and possibly earlier versions, modifies the first two letters of a filename extension after performing a security check, which allows remote attackers to bypass authentication via a filename with a .ats extension instead of a .hts extension. La extendisón ISAPI en BadBlue 1.7 hasta 2.2, y posiblemente versiones anteriores, modifica las dos primeras letras de la extensión de un archivo después de realizar comprobaciones de seguridad, lo que permite que atacantes remotos pasen la autentificación mediante un fichero .ats en lugar de uno .hts. • https://www.exploit-db.com/exploits/22620 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0075.html http://marc.info/?l=bugtraq&m=105346382524169&w=2 •
CVE-2002-1541
https://notcve.org/view.php?id=CVE-2002-1541
BadBlue 1.7 allows remote attackers to bypass password protections for directories and files via an HTTP request containing an extra / (slash). BadBlue 1.7 permiten a atacantes remotos eludir las protecciones de contraseñas en directorios y ficheros mediante una petición HTTP que contiene un caracter / (slash). • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0041.html http://www.iss.net/security_center/static/10466.php http://www.securityfocus.com/bid/6044 •
CVE-2002-2289
https://notcve.org/view.php?id=CVE-2002-2289
soinfo.php in BadBlue 1.7.1 calls the phpinfo function, which allows remote attackers to gain sensitive information including ODBC passwords. • http://online.securityfocus.com/archive/1/300992 http://securityreason.com/securityalert/3243 http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2002-11/0329.html http://www.securityfocus.com/bid/6243 https://exchange.xforce.ibmcloud.com/vulnerabilities/10690 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •