5 results (0.003 seconds)

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the "View Log Files" function. • https://www.exploit-db.com/exploits/10386 http://marc.info/?l=bugtraq&m=111205163531628&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57737-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000230.1-1 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 1

Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search function. • https://www.exploit-db.com/exploits/10386 http://marc.info/?l=bugtraq&m=111205163531628&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57737-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000230.1-1 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 3

Sun AnswerBook2 1.2 through 1.4.2 allows remote attackers to execute administrative scripts such as (1) AdminViewError and (2) AdminAddadmin via a direct request. • https://www.exploit-db.com/exploits/21677 http://archives.neohapsis.com/archives/bugtraq/2002-07/0486.html http://www.iss.net/security_center/static/9756.php http://www.securityfocus.com/bid/5383 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 2

The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts, which allows remote attackers to add user accounts to the interface by directly calling the admin CGI script. • https://www.exploit-db.com/exploits/20144 http://archives.neohapsis.com/archives/sun/2000-q3/0001.html http://seclists.org/bugtraq/2000/Aug/0105.html http://www.s21sec.com/en/avisos/s21sec-004-en.txt http://www.securityfocus.com/bid/1554 https://exchange.xforce.ibmcloud.com/vulnerabilities/5069 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 2

The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metacharacters. • https://www.exploit-db.com/exploits/20146 http://archives.neohapsis.com/archives/sun/2000-q3/0001.html http://seclists.org/bugtraq/2000/Aug/0105.html http://www.iss.net/security_center/static/5058.php http://www.s21sec.com/en/avisos/s21sec-004-en.txt http://www.securityfocus.com/bid/1556 •