![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-6131 – Kerio WebSTAR 5.4.2 (OSX) - 'libucache.dylib' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-6131
28 Nov 2006 — Untrusted search path vulnerability in (1) WSAdminServer and (2) WSWebServer in Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 and earlier allows local users with webstar privileges to gain root privileges via a malicious libucache.dylib helper library in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en (1) WSAdminServer y (2) WSWebServer en Kerio WebSTAR (4D WebSTAR Server Suite) 5.4.2 y anteriores permite a atacantes remotos con privilegios webstar obtener privilegios de ro... • https://www.exploit-db.com/exploits/2788 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-3143
https://notcve.org/view.php?id=CVE-2005-3143
05 Oct 2005 — Unspecified vulnerability in the Mailbox Server for 4D WebStar before 5.3.5 allows attackers to cause a denial of service (crash) via IMAP clients on Mac OS X 10.4 Mail 2. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History_535.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0696
https://notcve.org/view.php?id=CVE-2004-0696
16 Jul 2004 — The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a "*" (asterisk) character. El script ShellExample.cgi en WebSTAR 5.3.2 y anteriores permite a un atacante remotos listar directorios arbitrarios mediante una URL con la ruta deseada y un carácter "*" (asterisco). • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0698
https://notcve.org/view.php?id=CVE-2004-0698
16 Jul 2004 — 4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack. 4D WebSTAR 5.3.2 y anteriores permiten a usuarios locales leer y modificar ficheros de su elección mediante una ataque de enlaces simbólicos. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0697
https://notcve.org/view.php?id=CVE-2004-0697
16 Jul 2004 — Unknown vulnerability in 4D WebSTAR 5.3.2 and earlier allows remote attackers to read the php.ini configuration file and possibly obtain sensitive information. Vulnerabilidad desconocida en 4D WebSTAR 5.3.2 y anteriores permite a atacantes remotos leer el fichero de configuración php.ini y posiblemente obtener información sensible. • ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0695 – WebSTAR FTP Server - USER Overflow
https://notcve.org/view.php?id=CVE-2004-0695
16 Jul 2004 — Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command. Desbordamiento de búfer basado en la pila en el servicio FTP de 4D WebSTAR 5.3.2 y anteriores permite a atacantes remotos ejecutar código de su elección mediante un comando FTP largo. • https://www.exploit-db.com/exploits/16872 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0112
https://notcve.org/view.php?id=CVE-2004-0112
18 Mar 2004 — The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. El código que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una dene... • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc • CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0081
https://notcve.org/view.php?id=CVE-2004-0081
18 Mar 2004 — OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0079
https://notcve.org/view.php?id=CVE-2004-0079
18 Mar 2004 — The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. La función do_change_cipher_spec en OpenSSL 0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegación de servicio (caída) mediante una hábil unión SSL/TLS que provoca un puntero nulo. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc • CWE-476: NULL Pointer Dereference •