Page 30 of 169 results (0.008 seconds)

CVSS: 10.0EPSS: 12%CPEs: 5EXPL: 0

Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491. Desbordamiento de búfer basado en montículo en _mprosrv.exe de Progress Software Progress 9.1E y OpenEdge 10.1.x, como se usan en RSA Authentication Manager 6.0 y 6.1, SecurID Appliance 2.0, ACE/Server 5.2, y posiblemente otros productos, permite a atacantes remotos ejecutar código de su elección mediante paquetes manipulados. NOTA: este problema podría solaparse con CVE-2007-3491. • http://dvlabs.tippingpoint.com/advisory/TPTI-07-12 http://osvdb.org/37934 http://secunia.com/advisories/26058 http://secunia.com/advisories/26067 http://www.securityfocus.com/archive/1/473623/100/0/threaded http://www.securityfocus.com/bid/24675 http://www.securitytracker.com/id?1018389 http://www.vupen.com/english/advisories/2007/2530 http://www.vupen.com/english/advisories/2007/2531 https://exchange.xforce.ibmcloud.com/vulnerabilities/35385 •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 0

Buffer overflow in _mprosrv in Progress Software OpenEdge before 9.1E0422, and 10.x before 10.1B01, allows remote attackers to have an unknown impact via a malformed TCP/IP message. Desbordamiento de búfer en _mprosrv de Progress Software OpenEdge anterior a 9.1E0422, y 10.x anterior a 10.1B01, permite a atacantes remotos tener impacto desconocido mediante mensajes TCP/IP mal formados. • http://osvdb.org/37747 http://secunia.com/advisories/25865 http://securityreason.com/securityalert/2851 http://www.psdn.com/library/servlet/KbServlet/download/2629-102-4821/README_101B_01.pdf http://www.securityfocus.com/archive/1/472349/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/35104 •

CVSS: 7.8EPSS: 8%CPEs: 5EXPL: 2

WebSpeed 3.x in OpenEdge 10.x in Progress Software Progress 9.1e, and certain other 9.x versions, allows remote attackers to cause a denial of service (infinite loop and daemon hang) via a messenger URL that invokes _edit.r with no additional parameters, as demonstrated by requests for cgiip.exe or wsisa.dll with WService=wsbroker1/_edit.r in the PATH_INFO. WebSpeed 3.x de OpenEdge 10.x en Progress Software Progress 9.1e, y otras versiones concretas 9.x, permite a atacantes remotos provocar una denegación de servicio (bucle infinito y congelación de demonio) mediante una URL de mensajero que invoca _edit.r sin parámetros adicionales, como demuestra realizando peticiones de cgiip.exe ó wsisa.dll con WService=wsbroker1/_edit.r en PATH_INFO. • https://www.exploit-db.com/exploits/29943 http://osvdb.org/35541 http://progress.atgnow.com/esprogress/resultDisplay.do?gotoLink=115&docType=1006&clusterName=CombinedCluster&contentId=12&groupId=3&answerGroup=1&score=1932&page=http%3A%2F%2Fprogress.atgnow.com%2Fesprogress%2Fdocs%2FSolutions%2FProgress%2FESERVER_P123694.xhtml&result=0&excerpt=P123694 http://secunia.com/advisories/25129 http://www.ishare.nl http://www.securityfocus.com/archive/1/467375/100/0/threaded http://www.securityfocus.com/archive/1/46737 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Progress Webspeed Messenger allows remote attackers to obtain sensitive information via a WService parameter containing "wsbroker1/webutil/about.r", which reveals the operating system and product information. Progress Webspeed Messenger permite a atacantes remotos obtener información confidencial mediante un parámetro WService conteniendo "wsbroker1/webutil/about.r", lo cual revela el sistema operativo e información de producto. • http://www.ishare.nl http://www.securityfocus.com/archive/1/467184/100/0/threaded •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

Progress Webspeed Messenger allows remote attackers to read, create, modify, and execute arbitrary files by invoking webutil/_cpyfile.p in the WService parameter to (1) cgiip.exe or (2) wsisa.dll in scripts/, as demonstrated by using the save,editor options to create a new file using the fileName parameter. Progress Webspeed Messenger permite a atacantes remotos leer, crear, modificar y ejecutar archivos de su elección invocando a webutil/_cpyfile.p en el parámetro WService en (1) cgiip.exe o (2) wsisa.dll en scripts/, como se demostró con el uso de guardar, en las opciones de editor para crear un nuevo archivo utilizando el parámetro fileName. • http://secunia.com/advisories/24988 http://www.ishare.nl http://www.securityfocus.com/archive/1/466771/100/0/threaded http://www.securityfocus.com/archive/1/472574/100/0/threaded http://www.securityfocus.com/bid/23634 •