Page 3 of 18 results (0.011 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

Sun Java System Web Server 6.1 before 20070314 allows remote authenticated users with revoked client certificates to bypass the Certificate Revocation List (CRL) authorization control and access secure web server instances running under an account different from that used for the admin server via unspecified vectors. El Servidor Web Sun Java System 6.1 anterior al 20070314 permite a usuarios remotos autenticados con certificados de cliente revocados, evitar el control CRL (Lista de Certificados Revocados) y acceder a instancias seguras del servidor web que corren bajo cuentas diferentes de la utilizado por el administrador del servidor mediante vectores sin especificar. • http://osvdb.org/34074 http://secunia.com/advisories/24531 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102822-1 http://www.securitytracker.com/id?1017777 http://www.vupen.com/english/advisories/2007/0958 •

CVSS: 7.5EPSS: 1%CPEs: 18EXPL: 0

Unspecified vulnerability in Sun Java System Web Server 6.0 and 6.1 before 20070315 allows remote attackers to "gain unauthorized access to data", possibly involving a sample application. Una vulnerabilidad no especificada en Sun Java System Web Server versiones 6.0 y 6.1 anterior a 20070315, permite a atacantes remotos "gain unauthorized access to data", lo que posiblemente involucre una aplicación de muestra. • http://osvdb.org/34080 http://secunia.com/advisories/24545 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102833-1 http://www.securityfocus.com/bid/22993 http://www.securitytracker.com/id?1017788 http://www.vupen.com/english/advisories/2007/0972 https://exchange.xforce.ibmcloud.com/vulnerabilities/33016 •

CVSS: 6.8EPSS: 1%CPEs: 8EXPL: 0

HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors. Vulnerabilidad de contrabando de petición HTTP en Sun Java System Proxy Server anterior al 30/11/2006, cuando se usa con Sun Java System Application Server o Sun Java System Web Server, permite a atacantes remotos evitar el filtrado de petición HTTP, secuestrar sesiones web, realizar ataques de secuencias de comandos en sitios cruzados (XSS), y falsear la caché web mediante vectores de ataque no especificados. • http://secunia.com/advisories/23186 http://securitytracker.com/id?1017322 http://securitytracker.com/id?1017323 http://securitytracker.com/id?1017324 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 http://www.securityfocus.com/bid/21371 http://www.vupen.com/english/advisories/2006/4793 https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVSS: 4.0EPSS: 0%CPEs: 25EXPL: 0

Sun Java System Application Server (SJSAS) 7 through 8.1 and Web Server (SJSWS) 6.0 and 6.1 allows remote authenticated users to read files outside of the "document root directory" via a direct request using a UTF-8 encoded URI. Sun Java System Application Server (SJSAS) 7 hasta la 8.1 y Web Server (SJSWS) 6.0 y 6.1 permite a usuarios remotos validados leer archivos fuera del "directorio de documentos del root" a través de respuesta directas utilizando una codificación URI UTF-8. • http://secunia.com/advisories/21251 http://secunia.com/advisories/22425 http://securitytracker.com/id?1016596 http://securitytracker.com/id?1016597 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102521-1 http://support.avaya.com/elmodocs2/security/ASA-2006-204.htm http://www.securityfocus.com/bid/19200 http://www.vupen.com/english/advisories/2006/3020 https://exchange.xforce.ibmcloud.com/vulnerabilities/28061 •

CVSS: 6.8EPSS: 1%CPEs: 20EXPL: 0

Cross-site scripting (XSS) vulnerability in Sun ONE Web Server 6.0 SP9 and earlier, Java System Web Server 6.1 SP4 and earlier, Sun ONE Application Server 7 Platform and Standard Edition Update 6 and earlier, and Java System Application Server 7 2004Q2 Standard and Enterprise Edition Update 2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving error messages. • http://jvn.jp/jp/JVN%2303D5EAA8/index.html http://secunia.com/advisories/20147 http://securitytracker.com/id?1016125 http://securitytracker.com/id?1016126 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102164-1 http://www.kb.cert.org/vuls/id/114956 http://www.securityfocus.com/bid/18035 http://www.vupen.com/english/advisories/2006/1866 https://exchange.xforce.ibmcloud.com/vulnerabilities/26550 •