4 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Javamail does not properly handle a series of invalid login attempts in which the same e-mail address is entered as username and password, and the domain portion of this address yields a Java UnknownHostException error, which allows remote attackers to cause a denial of service (connection pool exhaustion) via a large number of requests, resulting in a SQLNestedException. NOTE: Sun disputes this issue, stating "The report makes references to source code and files that do not exist in the mentioned products. ** EN DISPUTA ** Javamail no maneja adecuadamente una serie de intentos de inicio de sesión inválidos en los que se ingresa la misma dirección de correo electrónico como nombre de usuario y contraseña, y la porción de dominio de esta dirección produce un error Java UnknownHostException, que permite que los atacantes remotos causen una denegación de servicio (agotamiento del grupo de conexiones) a través de una gran cantidad de solicitudes, lo que resulta en una excepción SQLNestedException. NOTA: Sun niega este problema y afirma que "El informe hace referencia al código fuente y los archivos que no existen en los productos mencionados". • http://archives.neohapsis.com/archives/bugtraq/2007-11/0239.html http://osvdb.org/45299 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products. • http://marc.info/?l=bugtraq&m=111697083812367&w=2 http://tomcat.apache.org/security-5.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 2

JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products. • https://www.exploit-db.com/exploits/25702 http://marc.info/?l=bugtraq&m=111697083812367&w=2 http://tomcat.apache.org/security-5.html http://www.securityfocus.com/bid/13753 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in the MimeBodyPart.getFileName method in JavaMail 1.3.2 allows remote attackers to write arbitrary files via a .. (dot dot) in the filename in the Content-Disposition header. • https://www.exploit-db.com/exploits/25395 http://marc.info/?l=bugtraq&m=111335615600839&w=2 •