19 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

25 Feb 2010 — Multiple unspecified vulnerabilities in (1) ns-slapd and (2) slapd.exe in Sun Directory Server Enterprise Edition 7.0, Sun Java System Directory Server 5.2, and Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 allow remote attackers to cause a denial of service (daemon crash) via a crafted LDAP search request. Múltiples vulnerabilidades sin especificar en (1) ns-slapd y (2) slapd.exe en Sun Directory Server Enterprise Edition v7.0, Sun Java System Directory Server v5.2, y Sun Java Syste... • http://sunsolve.sun.com/search/document.do?assetkey=1-21-143884-01-1 •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 3

14 Jan 2010 — The core_get_proxyauth_dn function in ns-slapd in Sun Java System Directory Server Enterprise Edition 7.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted LDAP Search Request message. La función core_get_proxyauth_dn en ns-slapd en Sun Java System Directory Server Enterprise Edition v7.0, permite a atacantes remotos provocar una denegación de servicio (deferencia a puntero NULL y caída de demonio) a través de un mensaje LDAP Search Request manipu... • https://www.exploit-db.com/exploits/33483 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

28 Dec 2009 — Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 does not enable the SO_KEEPALIVE socket option, which makes it easier for remote attackers to cause a denial of service (connection slot exhaustion) via multiple connections, aka Bug Id 6782659. Directory Proxy Server (DPS) en Sun Java System Directory Server Enterprise Edition v6.0 hasta v6.3.1 no habilita opción SO_KEEPALIVE socket, facilitando a atacantes remotos provocar una denegación de servicio (agot... • http://secunia.com/advisories/37915 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

28 Dec 2009 — Unspecified vulnerability in the psearch (aka persistent search) functionality in Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 allows remote attackers to cause a denial of service (psearch outage) by using a crafted psearch client to send requests that trigger a psearch thread loop, aka Bug Id 6855978. Vulnerabilidad no especificada en la funcionalidad psearch (también conocido como persistent search) en un Java System Directory Server Enterprise Edit... • http://secunia.com/advisories/37915 •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

28 Dec 2009 — Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 does not properly handle multiple client connections within a short time window, which allows remote attackers to hijack the backend connection of an authenticated user, and obtain the privileges of this user, by making a client connection in opportunistic circumstances, related to "long binds," aka Bug Ids 6828462 and 6823593. Directory Proxy Server (DPS) en Sun Java System Directory Server Enterprise Edit... • http://secunia.com/advisories/37915 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

28 Dec 2009 — Directory Proxy Server (DPS) in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3.1 does not properly implement the max-client-connections configuration setting, which allows remote attackers to cause a denial of service (connection slot exhaustion) by making multiple connections and performing no operations on these connections, aka Bug Id 6648665. Directory Proxy Server (DPS) en Sun Java System Directory Server Enterprise Edition v6.0 hasta v6.3.1 no implementa adecuadamente los valores ... • http://secunia.com/advisories/37915 • CWE-16: Configuration •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

17 Apr 2009 — The Online Help feature in Sun Java System Directory Server 5.2 and Enterprise Edition 5 allows remote attackers to determine the existence of files and directories, and possibly obtain partial contents of files, via unspecified vectors. La característica Online Help en Sun Java System Directory Server 5.2 y Enterprise Edition 5 permite a atacantes remotos determinar la existencia de ficheros y directorios y posiblemente obtener contenidos parciales de ficheros mediante vectores no especificados. • http://osvdb.org/53800 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

17 Feb 2009 — Sun Java System Directory Proxy Server in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3, when a JDBC data source is used, does not properly handle (1) a long value in an ADD or (2) long string attributes, which allows remote attackers to cause a denial of service (JDBC backend outage) via crafted LDAP requests. Sun Java System Directory Proxy Server en Sun Java System Directory Server Enterprise Edition v6.0 hasta v6.3, cuando una fuente de datos JDBC es utilizado, no se maneja adecuad... • http://secunia.com/advisories/33923 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 1%CPEs: 2EXPL: 0

13 Feb 2009 — Unspecified vulnerability in Sun Java System Directory Server 5.2 p6 and earlier, and Enterprise Edition 5, allows remote attackers to cause a denial of service (daemon crash) via crafted LDAP requests. Vulnerabilidad no especificada en Sun Java System Directory Server v5.2 p6 y versiones anteriores, y Enterprise Edition v5, permite a atacantes remotos provocar una denegación de servicio (parada de demonio) mediante peticiones LDAP manipuladas. • http://secunia.com/advisories/33850 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

28 Apr 2008 — Sun Java System Directory Proxy Server 6.0, 6.1, and 6.2 classifies a connection using the "bind-dn" criteria, which can cause an incorrect application of policy and allows remote attackers to bypass intended access restrictions for the server. Sun Java System Directory Proxy Server 6.0, 6.1, y 6.2 clasifica una conexión utilizando el criterio "bind-dn", lo cual puede provocar una aplicación incorrecta de políticas y permitir a atacantes remotos evitar restricciones de acceso previstas por el servidor. • http://secunia.com/advisories/29978 • CWE-264: Permissions, Privileges, and Access Controls •