Page 2 of 9 results (0.012 seconds)

CVSS: 5.0EPSS: 28%CPEs: 12EXPL: 0

Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption). • http://marc.info/?l=bugtraq&m=107936690702515&w=2 http://secunia.com/advisories/11132 http://www.macromedia.com/devnet/security/security_zone/mpsb04-04.html http://www.securityfocus.com/bid/9877 https://exchange.xforce.ibmcloud.com/vulnerabilities/15473 •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

Unknown vulnerability in Sun Java System Application Server 7.0 Update 2 and earlier, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption). • http://marc.info/?l=bugtraq&m=107936690702515&w=2 http://secunia.com/advisories/11130 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57517-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201713-1 http://www.securityfocus.com/bid/9877 https://exchange.xforce.ibmcloud.com/vulnerabilities/15473 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in gxnsapi6.dll NSAPI plugin of the Connector Module for Sun ONE Application Server before 6.5 allows remote attackers to execute arbitrary code via a long HTTP request URL. Desbordamiento de búfer en el conector gxnsapi6.dll del Módulo Conector de Sun ONE Application Server anterior a 6.5 permite a atacantes remotos ejecutar código arbitrario mediante una URL larga en una petición HTTP. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/52022 http://www.atstake.com/research/advisories/2003/a031303-1.txt http://www.ciac.org/ciac/bulletins/n-064.shtml http://www.securityfocus.com/bid/7082 https://exchange.xforce.ibmcloud.com/vulnerabilities/11529 •

CVSS: 5.0EPSS: 32%CPEs: 26EXPL: 2

Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter. • https://www.exploit-db.com/exploits/21603 http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html http://www.iss.net/security_center/static/9517.php http://www.securityfocus.com/bid/5191 •