Page 2 of 8 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 44EXPL: 0

Hitachi Web Server 01-00 through 03-00-01, as used by certain Cosminexus products, does not properly validate SSL client certificates, which might allow remote attackers to spoof authentication via a client certificate with a forged signature. Hitachi Web Server 01-00 hasta 03-00-01, tal y como se usa en determinados productos Cosminexus, no valida apropiadamente certificados SSL cliente, lo cual podría permitir a atacantes remotos suplantar autenticación mediante un certificado cliente con una firma falsificada. • http://osvdb.org/42026 http://secunia.com/advisories/27421 http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html http://www.securityfocus.com/bid/26271 http://www.vupen.com/english/advisories/2007/3666 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 7%CPEs: 2EXPL: 1

TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534. TeamSpeak WebServer 2.0 para Windows no valida la longitud del valor del parámetro y no expiran las sesiones TCP, lo cual permite a atacantes remotos provocar denegación de servicio (consumo de CPU y memoria)a través de los parámetros username y password en una respuesta en login.tscmd sobre el puerto TCP 14534. • https://www.exploit-db.com/exploits/4205 http://osvdb.org/38595 http://secunia.com/advisories/26141 http://www.securityfocus.com/bid/24977 https://exchange.xforce.ibmcloud.com/vulnerabilities/35518 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files. Vulnerabilidad en el script files.pl en Novell WebServer Examples Toolkit 2 permite a atacantes remotos leer ficheros arbitrarios. • https://www.exploit-db.com/exploits/20482 http://www.roxanne.org/faqs/www-secure/wwwsf4.html#Q35 http://www.w3.org/Security/Faq/wwwsf8.html#Q87 https://exchange.xforce.ibmcloud.com/vulnerabilities/2054 •