Page 2 of 14 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Multiple directory traversal vulnerabilities in Borland Web Server (BWS) 1.0b3 and earlier allow remote attackers to read and download arbitrary files via (1) multi-dot "......" sequences, or (2) "%5c%2e%2e" (encoded "\..") sequences, in the URL. • https://www.exploit-db.com/exploits/23597 http://marc.info/?l=bugtraq&m=107497413413907&w=2 http://securitytracker.com/id?1008840 http://www.securityfocus.com/bid/9486 https://exchange.xforce.ibmcloud.com/vulnerabilities/14948 •

CVSS: 7.5EPSS: 96%CPEs: 19EXPL: 2

Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx. Vulnerabilidad de atravesamiento de directorios en los visores web de Business Objects Crystal Reports 9 and 10, y Crystal Enterprise 9 o 10, usados en Visual Studio .NET 2003 y Outlook 2003 con Business Contact Manager, Microsoft Business Solutions CRM 1.2, y otros productos, permiten a atacantes remotos leer y borrar ficheros de su elección mediante secuencias ".." en el argumento dynamicimag de crystalimagehandler.aspx. • https://www.exploit-db.com/exploits/24077 http://marc.info/?l=bugtraq&m=108360413811017&w=2 http://marc.info/?l=bugtraq&m=108671836127360&w=2 http://secunia.com/advisories/11800 http://support.businessobjects.com/fix/hot/critical/bulletins/security_bulletin_june04.asp http://www.osvdb.org/6748 http://www.securityfocus.com/bid/10260 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-017 https://exchange.xforce.ibmcloud.com/vulnerabilities/16044 https:/&# •

CVSS: 5.0EPSS: 23%CPEs: 9EXPL: 4

Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command. • https://www.exploit-db.com/exploits/303 https://www.exploit-db.com/exploits/24165 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html http://marc.info/?l=bugtraq&m=108611386202493&w=2 http://secunia.com/advisories/11756 http://secunia.com/advisories/19350 http://securitytracker.com/id?1010381 http://www.debian.org/security/2006/dsa-1014 http://www.osvdb.org/6408 http://www.osvdb.org/6624 http://www.securiteam.com/unixfocus/5AP0P0UCUO.html http:& •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 2

The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges. • http://secunia.com/advisories/11172 http://securitytracker.com/id?1009500 http://www.idefense.com/application/poi/display?id=80&type=vulnerabilities&flashstatus=true http://www.osvdb.org/4381 http://www.securityfocus.com/bid/9929 https://exchange.xforce.ibmcloud.com/vulnerabilities/15546 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow gds_lock_mgr of Interbase Database 6.x allows local users to gain privileges via a long ISC_LOCK_ENV environment variable (INTERBASE_LOCK). Desbordamiento de búfer gds_lock_mgr de Interbase Database 6.x permite a usuarios locales la obtención de privilegios mediante una variable de entorno ISC_LOCK_ENV larga. (INTERBASE_LOCK). • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html http://marc.info/?l=bugtraq&m=104940730819887&w=2 http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt •