5 results (0.009 seconds)

CVSS: 6.1EPSS: 0%CPEs: 47EXPL: 1

01 Jun 2009 — The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting. La configuración por defecto de Sun ONE/iPlanet Web Server v4.1 SP! al SP2 y v6.0 SP1 al SP5 responde a las peticiones HTTP TRACE, lo que puede permitir a atacantes remotos el robo de información usando ataques de seguimi... • http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html • CWE-16: Configuration •

CVSS: 9.8EPSS: 1%CPEs: 11EXPL: 4

31 Dec 2002 — iPlanet Web Server Enterprise Edition and Netscape Enterprise Server 4.0 and 4.1 allows remote attackers to conduct HTTP Basic Authentication via the wp-force-auth Web Publisher command, which provides a distinct attack vector and may make it easier to conduct brute force password guessing without detection. • http://lists.virus.org/vulnwatch-0201/msg00008.html •

CVSS: 7.5EPSS: 7%CPEs: 26EXPL: 2

31 Aug 2002 — Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter. • https://www.exploit-db.com/exploits/21603 •

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 0

12 Aug 2002 — Buffer overflow in Sun ONE / iPlanet Web Server 4.1 and 6.0 allows remote attackers to execute arbitrary code via an HTTP request using chunked transfer encoding. • http://marc.info/?l=bugtraq&m=102890933623192&w=2 •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 0

15 Jul 2002 — Buffer overflow in the search component for iPlanet Web Server (iWS) 4.1 and Sun ONE Web Server 6.0 allows remote attackers to execute arbitrary code via a long argument to the NS-rel-doc-name parameter. Desbordamiento de búfer en la búsqueda de componentes para iPlanet Web Server (iWS) 4.1 y 6.0 permite a atacantes remotos la ejecución arbitraria de código mediante un argumento largo en el parámetro NS-rel-doc-name. • http://marc.info/?l=bugtraq&m=102622220416889&w=2 •