Page 2 of 9 results (0.013 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request. Sun Java System Application Server (AS) 8.1 y 8.2 permite a atacantes remotos leer los ficheros de configuración de las aplicaciones Web en los directorios (1) WEB-INF o (2) META-INF mediante una solicitud mal formada. • http://osvdb.org/51604 http://secunia.com/advisories/33725 http://sunsolve.sun.com/search/document.do?assetkey=1-21-119166-35-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-245446-1 http://www.securityfocus.com/bid/33397 http://www.vupen.com/english/advisories/2009/0208 https://exchange.xforce.ibmcloud.com/vulnerabilities/48161 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 14%CPEs: 8EXPL: 0

Unspecified vulnerability in Sun Java System Access Manager 7.1, when installed in a Sun Java System Application Server 8.x container, allows remote attackers to execute arbitrary code via unspecified vectors. Vulnerabilidad no especificada en Sun Java System Access Manager 7.1, cuando se instala en un contenedor Sun Java System Application Server 8.x, permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://osvdb.org/37757 http://secunia.com/advisories/26976 http://securitytracker.com/id?1018753 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103069-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200839-1 http://www.securityfocus.com/bid/25842 http://www.vupen.com/english/advisories/2007/3282 https://exchange.xforce.ibmcloud.com/vulnerabilities/36847 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in Sun Java System (SJS) Application Server 8.1 through 9.0 before 20070724 on Windows allows remote attackers to obtain JSP source code via unspecified vectors. Vulnerabilidad sin especificar en el Sun Java System (SJS) Application Server 8.1 hasta la 9.0 anterior al 20070724 bajo Windows, permite a atacantes remotos la obtención de código fuente JSP a través de vectores sin especificar. • http://osvdb.org/37250 http://secunia.com/advisories/26187 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103000-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201537-1 http://www.securityfocus.com/bid/25058 http://www.securitytracker.com/id?1018452 http://www.vupen.com/english/advisories/2007/2647 https://exchange.xforce.ibmcloud.com/vulnerabilities/35579 •

CVSS: 9.3EPSS: 2%CPEs: 21EXPL: 0

Sun Java System Application Server and Web Server 7.0 through 9.0 before 20070710 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute an arbitrary Java method via a crafted stylesheet, a related issue to CVE-2007-3716. Sun Java System Application Server y Web Server versiones 7.0 hasta 9.0 anterior al 20070710, no procesan apropiadamente las hojas de estilo XSLT en las transformaciones de XSLT en firmas XML, lo que permite a atacantes dependiendo del contexto ejecutar un método Java arbitrario por medio de una hoja de estilo diseñada, un problema relacionado con CVE-2007-3716. • http://osvdb.org/37248 http://secunia.com/advisories/26023 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102992-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200054-1 http://www.isecpartners.com/advisories/2007-04-dsig.txt http://www.isecpartners.com/files/XMLDSIG_Command_Injection.pdf http://www.securityfocus.com/archive/1/473552/100/0/threaded http://www.securityfocus.com/archive/1/473553/100/0/threaded http://www.securityfocus.com/bid/24850 http& • CWE-20: Improper Input Validation •