13 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

30 Nov 2023 — An uncontrolled search path element vulnerability has been found on 4D and 4D server Windows executables applications, affecting version 19 R8 100218. This vulnerability consists in a DLL hijacking by replacing x64 shfolder.dll in the installation path, causing an arbitrary code execution. Se ha encontrado una vulnerabilidad no controlada en un elemento de ruta de búsqueda en aplicaciones ejecutables de Windows de 4D y 4D server, afectando a la versión 19 R8 100218. Esta vulnerabilidad consiste en un secues... • https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-element-vulnerability-4d-and-4d-windows-server • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

16 Jun 2023 — An information disclosure vulnerability in 4D SAS 4D Server Application v17, v18, v19 R7 and earlier allows attackers to retrieve password hashes for all users via eavesdropping. • https://blog.4d.com/security-bulletin-two-cves-and-how-to-stay-secure • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

16 Jun 2023 — A broken authentication vulnerability in 4D SAS 4D Server software v17, v18, v19 R7, and earlier allows attackers to send crafted TCP packets containing requests to perform arbitrary actions. • https://blog.4d.com/security-bulletin-two-cves-and-how-to-stay-secure • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

05 Oct 2005 — Unspecified vulnerability in the Mailbox Server for 4D WebStar before 5.3.5 allows attackers to cause a denial of service (crash) via IMAP clients on Mac OS X 10.4 Mail 2. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History_535.txt •

CVSS: 9.8EPSS: 7%CPEs: 2EXPL: 2

11 May 2005 — Buffer overflow in the Tomcat plugin in 4d WebSTAR 5.33 and 5.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL. • https://www.exploit-db.com/exploits/25626 •

CVSS: 9.8EPSS: 79%CPEs: 9EXPL: 2

16 Jul 2004 — Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command. Desbordamiento de búfer basado en la pila en el servicio FTP de 4D WebSTAR 5.3.2 y anteriores permite a atacantes remotos ejecutar código de su elección mediante un comando FTP largo. • https://www.exploit-db.com/exploits/16872 •

CVSS: 5.3EPSS: 0%CPEs: 9EXPL: 0

16 Jul 2004 — The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a "*" (asterisk) character. El script ShellExample.cgi en WebSTAR 5.3.2 y anteriores permite a un atacante remotos listar directorios arbitrarios mediante una URL con la ruta deseada y un carácter "*" (asterisco). • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

16 Jul 2004 — Unknown vulnerability in 4D WebSTAR 5.3.2 and earlier allows remote attackers to read the php.ini configuration file and possibly obtain sensitive information. Vulnerabilidad desconocida en 4D WebSTAR 5.3.2 y anteriores permite a atacantes remotos leer el fichero de configuración php.ini y posiblemente obtener información sensible. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

16 Jul 2004 — 4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack. 4D WebSTAR 5.3.2 y anteriores permiten a usuarios locales leer y modificar ficheros de su elección mediante una ataque de enlaces simbólicos. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •

CVSS: 7.5EPSS: 5%CPEs: 252EXPL: 0

18 Mar 2004 — The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. La función do_change_cipher_spec en OpenSSL 0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegación de servicio (caída) mediante una hábil unión SSL/TLS que provoca un puntero nulo. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc • CWE-476: NULL Pointer Dereference •