Page 7 of 33 results (0.008 seconds)

CVSS: 6.8EPSS: 97%CPEs: 47EXPL: 1

Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157. Vulnerabilidad de comandos en sitios cruzados (cross-site scripting, XSS) en la página de error por defecto en Apache 2.0 antes de 2.0.43, y en 1.3.x hasta 1.3.26, cuando el parámetro UseCanonicalName está desactivado, y está presente el soporte para comodines DNS, permite a atacantes ejecutar comandos como otro visitante de la página mediante la cabecera Host: • https://www.exploit-db.com/exploits/21885 ftp://patches.sgi.com/support/free/security/advisories/20021105-02-I http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0003.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530 http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2 http://marc.info/?l=bugtraq&m=103357160425708&w=2 http://marc.info/?l=bugtraq&m=103376585508776&w=2 http •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in mod_sql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the query string of the URL. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0339.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0372.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0463.html http://online.securityfocus.com/archive/1/155881 http://www.iss.net/security_center/static/5817.php http://www.securityfocus.com/bid/2150 •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 1

The default configurations of (1) the port listener and (2) modplsql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allow remote attackers to view privileged database information via HTTP requests for Database Access Descriptor (DAD) files. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0339.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0372.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0463.html http://online.securityfocus.com/archive/1/155881 http://www.iss.net/security_center/static/5818.php http://www.securityfocus.com/bid/2150 •