4 results (0.009 seconds)

CVSS: 7.8EPSS: 5%CPEs: 8EXPL: 0

IBM OS/400 (aka i5/OS) V4R2M0 through V5R3M0 on iSeries machines sends responses to TCP SYN-FIN packets, which allows remote attackers to obtain system information and possibly bypass firewall rules. IBM OS/400 (también conocido como i5/OS) V4R2M0 hasta V5R3M0 en máquinas iSeries envía respuestas a paquetes TCP SYN-FIN, lo cual permite a atacantes remotos obtener información sensible y posiblemente evitar reglas de cortafuegos. • http://osvdb.org/37792 http://secunia.com/advisories/25885 http://www-1.ibm.com/support/docview.wss?uid=nas2742405285431729b86256e620067dc17 http://www.securityfocus.com/bid/24706 https://exchange.xforce.ibmcloud.com/vulnerabilities/35173 •

CVSS: 10.0EPSS: 13%CPEs: 13EXPL: 0

Buffer overflow in the SYSTEM_CREATE_INSTANCE function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. Desbordamiento de búfer en la función SYSTEM_CREATE_INSTANCE en la SAP RFC Library 6.40 y 7.00 anterior al 11/12/2006 permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados. NOTA: esta información está basada en revelaciones iniciales imprecisas. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2536 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf http://www.securityfocus.com/archive/1/464683/100/0/threaded http://www.securityfocus.com/bid/23307 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33416 •

CVSS: 10.0EPSS: 13%CPEs: 13EXPL: 0

Buffer overflow in the RFC_START_GUI function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. Desbordamiento de búfer en la función RFC_START_GUI en la libreria SAP RFC Library 6.40 y 7.00 anterior a 20061211 permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. NOTA: Esta información se basa en una vaga descripción general. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2537 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf http://www.securityfocus.com/archive/1/464680/100/0/threaded http://www.securityfocus.com/bid/23304 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33420 •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 0

The TRUSTED_SYSTEM_SECURITY function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to verify the existence of users and groups on systems and domains via unspecified vectors, a different vulnerability than CVE-2006-6010. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. La función TRUSTED_SYSTEM_SECURITY en la SAP RFC Library 6.40 y 7.00 anterior al 11/12/2006 permite a atacantes remotos verificar la existencia de usuarios y grupos en sistemas y dominios mediante vectores no especificados, una vulnerabilidad diferente que CVE-2006-6010. NOTA: esta información está basada en revelaciones iniciales imprecisas. • http://secunia.com/advisories/24722 http://securityreason.com/securityalert/2535 http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_TRUSTED_SYSTEM_SECURITY_RFC_Function_Information_Disclosure.pdf http://www.securityfocus.com/archive/1/464669/100/0/threaded http://www.securityfocus.com/bid/23305 http://www.vupen.com/english/advisories/2007/1270 https://exchange.xforce.ibmcloud.com/vulnerabilities/33423 •