9 results (0.059 seconds)

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 5

Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en (1) WSAdminServer y (2) WSWebServer en Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 y anteriores permite a atacantes remotos con privilegios webstar obtener privilegios de root mediante una librería de ayuda libucache.dylib maliciosa en el directorio de trabajo actual. • https://www.exploit-db.com/exploits/2788 http://secunia.com/advisories/22906 http://securityreason.com/securityalert/1921 http://securitytracker.com/id?1017239 http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt http://www.osvdb.org/30450 http://www.securityfocus.com/archive/1/451832/100/200/threaded http://www.securityfocus.com/bid/21123 http://www.vupen.com/english/advisories/2006/4539 https://exchange.xforce.ibmcloud.com/vulnerabilities/30308 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Unspecified vulnerability in the Mailbox Server for 4D WebStar before 5.3.5 allows attackers to cause a denial of service (crash) via IMAP clients on Mac OS X 10.4 Mail 2. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History_535.txt http://secunia.com/advisories/17003 http://www.securityfocus.com/bid/14981 •

CVSS: 7.5EPSS: 87%CPEs: 9EXPL: 2

Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command. Desbordamiento de búfer basado en la pila en el servicio FTP de 4D WebSTAR 5.3.2 y anteriores permite a atacantes remotos ejecutar código de su elección mediante un comando FTP largo. • https://www.exploit-db.com/exploits/16872 https://www.exploit-db.com/exploits/9928 ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt http://www.atstake.com/research/advisories/2004/a071304-1.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/16686 •

CVSS: 3.6EPSS: 0%CPEs: 9EXPL: 0

4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack. 4D WebSTAR 5.3.2 y anteriores permiten a usuarios locales leer y modificar ficheros de su elección mediante una ataque de enlaces simbólicos. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt http://www.atstake.com/research/advisories/2004/a071304-1.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/16689 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 0

The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a "*" (asterisk) character. El script ShellExample.cgi en WebSTAR 5.3.2 y anteriores permite a un atacante remotos listar directorios arbitrarios mediante una URL con la ruta deseada y un carácter "*" (asterisco). • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt http://www.atstake.com/research/advisories/2004/a071304-1.txt http://www.securityfocus.com/bid/10721 https://exchange.xforce.ibmcloud.com/vulnerabilities/16687 •