Page 2 of 8 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Sun Java System Directory Proxy Server in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3, when a JDBC data source is used, does not properly handle (1) a long value in an ADD or (2) long string attributes, which allows remote attackers to cause a denial of service (JDBC backend outage) via crafted LDAP requests. Sun Java System Directory Proxy Server en Sun Java System Directory Server Enterprise Edition v6.0 hasta v6.3, cuando una fuente de datos JDBC es utilizado, no se maneja adecuadamente (1) un valor largo en un ADD o (2) atributos de cadena largos, lo que permite a atacantes remotos provocar una denegación de servicio (JDBC backend outage) a través de peticiones manipulada LDAP. • http://secunia.com/advisories/33923 http://sunsolve.sun.com/search/document.do?assetkey=1-21-125276-08-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-251086-1 http://www.securityfocus.com/bid/33761 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Sun Java System Directory Proxy Server 6.0, 6.1, and 6.2 classifies a connection using the "bind-dn" criteria, which can cause an incorrect application of policy and allows remote attackers to bypass intended access restrictions for the server. Sun Java System Directory Proxy Server 6.0, 6.1, y 6.2 clasifica una conexión utilizando el criterio "bind-dn", lo cual puede provocar una aplicación incorrecta de políticas y permitir a atacantes remotos evitar restricciones de acceso previstas por el servidor. • http://secunia.com/advisories/29978 http://sunsolve.sun.com/search/document.do?assetkey=1-26-235381-1 http://www.securityfocus.com/bid/28941 http://www.securitytracker.com/id?1019925 http://www.vupen.com/english/advisories/2008/1374/references • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 3%CPEs: 93EXPL: 0

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message. • http://marc.info/?l=bugtraq&m=109351293827731&w=2 http://www.securityfocus.com/bid/11015 http://xforce.iss.net/xforce/alerts/id/180 https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 •