Page 2 of 16 results (0.003 seconds)

CVSS: 7.5EPSS: 15%CPEs: 12EXPL: 0

Heap-based buffer overflow in Borland idsql32.dll 5.1.0.4, as used by RevilloC MailServer; 5.2.0.2 as used by Borland Developer Studio 2006; and possibly other versions allows remote attackers to execute arbitrary code via a long SQL statement, related to use of the DbiQExec function. Desbordamiento del buffer basado en pilas en el Borland idsql32.dll 5.1.0.4, como el usado en el RevilloC MailServer, la 5.2.0.2 como el usado en el Developer Studio 2006 y posiblemente otras versiones, permite a atacantes remotos ejecutar código de su elección a través de la declaración de una sentencia larga en SQL relacionada con el uso de la función DbiQExec. • http://secunia.com/advisories/22570 http://secunia.com/secunia_research/2006-70/advisory http://www.securityfocus.com/archive/1/453003/100/0/threaded http://www.securityfocus.com/bid/21342 http://www.vupen.com/english/advisories/2006/4763 https://exchange.xforce.ibmcloud.com/vulnerabilities/30583 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Borland C++Builder 6 (BCB6) with Update Pack 4 Enterprise edition (ent_upd4) evaluates the "i>sizeof(int)" expression to false when i equals -1, which might introduce integer overflow vulnerabilities into applications that could be exploited by context-dependent attackers. • http://securitytracker.com/id?1015588 http://www.osvdb.org/22953 http://www.securityfocus.com/archive/1/424085/100/0/threaded http://www.xfocus.net/releases/200602/a849.html https://exchange.xforce.ibmcloud.com/vulnerabilities/24514 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Multiple directory traversal vulnerabilities in Borland Web Server (BWS) 1.0b3 and earlier allow remote attackers to read and download arbitrary files via (1) multi-dot "......" sequences, or (2) "%5c%2e%2e" (encoded "\..") sequences, in the URL. • https://www.exploit-db.com/exploits/23597 http://marc.info/?l=bugtraq&m=107497413413907&w=2 http://securitytracker.com/id?1008840 http://www.securityfocus.com/bid/9486 https://exchange.xforce.ibmcloud.com/vulnerabilities/14948 •

CVSS: 7.5EPSS: 96%CPEs: 19EXPL: 2

Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx. Vulnerabilidad de atravesamiento de directorios en los visores web de Business Objects Crystal Reports 9 and 10, y Crystal Enterprise 9 o 10, usados en Visual Studio .NET 2003 y Outlook 2003 con Business Contact Manager, Microsoft Business Solutions CRM 1.2, y otros productos, permiten a atacantes remotos leer y borrar ficheros de su elección mediante secuencias ".." en el argumento dynamicimag de crystalimagehandler.aspx. • https://www.exploit-db.com/exploits/24077 http://marc.info/?l=bugtraq&m=108360413811017&w=2 http://marc.info/?l=bugtraq&m=108671836127360&w=2 http://secunia.com/advisories/11800 http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp http://www.osvdb.org/6748 http://www.securityfocus.com/bid/10260 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017 https://exchange.xforce.ibmcloud.com/vulnerabilities/16044 https:/&# •

CVSS: 5.0EPSS: 23%CPEs: 9EXPL: 4

Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command. • https://www.exploit-db.com/exploits/303 https://www.exploit-db.com/exploits/24165 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html http://marc.info/?l=bugtraq&m=108611386202493&w=2 http://secunia.com/advisories/11756 http://secunia.com/advisories/19350 http://securitytracker.com/id?1010381 http://www.debian.org/security/2006/dsa-1014 http://www.osvdb.org/6408 http://www.osvdb.org/6624 http://www.securiteam.com/unixfocus/5AP0P0UCUO.html http:& •