Page 45 of 559 results (0.010 seconds)

CVSS: 7.5EPSS: 8%CPEs: 10EXPL: 0

Format string vulnerability in libwebconsole_services.so in Sun Java Web Console 2.2.2 through 2.2.5 allows remote attackers to cause a denial of service (application crash), obtain sensitive information, and possibly execute arbitrary code via unspecified vectors during a failed login attempt, related to syslog. Vulnerabilidad de formato de cadena en libwebconsole_services.so de Sun Java Web Console 2.2.2 hasta 2.2.5 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación), obtener información confidencial, y posiblemente ejecutar código de su elección mediante vectores no especificados durante un intento fallido de autenticación en el sistema, referido a syslog. • http://osvdb.org/34902 http://secunia.com/advisories/24927 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102854-1 http://www.nruns.com/security_advisory_sun_java_format_string.php http://www.securityfocus.com/archive/1/466048/100/0/threaded http://www.securityfocus.com/bid/23539 http://www.securitytracker.com/id?1017930 http://www.vupen.com/english/advisories/2007/1443 https://exchange.xforce.ibmcloud.com/vulnerabilities/33731 https://oval.cisecurity.org/repository/ •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Unspecified vulnerability in the Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) before 6.1.0.7 has unknown impact and attack vectors. Vulnerabilidad no especificada en Servlet Engine/Web Container en IBM WebSphere Application Server (WAS) anterior a 6.1.0.7 tiene un impacto desconocido y vectores de ataque. • http://osvdb.org/41605 http://secunia.com/advisories/24852 http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951#6107 http://www-1.ibm.com/support/search.wss?rs=0&q=PK36447&apar=only http://www.vupen.com/english/advisories/2007/1282 https://exchange.xforce.ibmcloud.com/vulnerabilities/33471 •

CVSS: 5.0EPSS: 4%CPEs: 12EXPL: 0

The RFC_SET_REG_SERVER_PROPERTY function in the SAP RFC Library 6.40 and 7.00 before 20070109 implements an option for exclusive access to an RFC server, which allows remote attackers to cause a denial of service (client lockout) via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. La función RFC_SET_REG_SERVER_PROPERTY en la libreria SAP RFC Library 6.40 y 7.00 anterior a 20070109 implementa una opción para acceso exclusivo a un servidor RFC, lo cual permite a atacantes remotos provocar denegación de servico (cierre del cliente) a través de vectores no especificados. NOTA: Esta información se basa en una vaga descripción inicial. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2540 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_SET_REG_SERVER_PROPERTY_RFC_Function_Denial_of_Service.pdf http://www.securityfocus.com/archive/1/464685/100/0/threaded http://www.securityfocus.com/bid/23309 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33418 •

CVSS: 10.0EPSS: 13%CPEs: 13EXPL: 0

Buffer overflow in the SYSTEM_CREATE_INSTANCE function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. Desbordamiento de búfer en la función SYSTEM_CREATE_INSTANCE en la SAP RFC Library 6.40 y 7.00 anterior al 11/12/2006 permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados. NOTA: esta información está basada en revelaciones iniciales imprecisas. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2536 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf http://www.securityfocus.com/archive/1/464683/100/0/threaded http://www.securityfocus.com/bid/23307 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33416 •

CVSS: 10.0EPSS: 13%CPEs: 13EXPL: 0

Buffer overflow in the RFC_START_GUI function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. Desbordamiento de búfer en la función RFC_START_GUI en la libreria SAP RFC Library 6.40 y 7.00 anterior a 20061211 permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. NOTA: Esta información se basa en una vaga descripción general. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2537 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf http://www.securityfocus.com/archive/1/464680/100/0/threaded http://www.securityfocus.com/bid/23304 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33420 •