6 results (0.010 seconds)

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the "View Log Files" function. • https://www.exploit-db.com/exploits/10386 http://marc.info/?l=bugtraq&m=111205163531628&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57737-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000230.1-1 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 1

Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search function. • https://www.exploit-db.com/exploits/10386 http://marc.info/?l=bugtraq&m=111205163531628&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57737-1 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000230.1-1 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 3

Sun AnswerBook2 1.2 through 1.4.2 allows remote attackers to execute administrative scripts such as (1) AdminViewError and (2) AdminAddadmin via a direct request. • https://www.exploit-db.com/exploits/21677 http://archives.neohapsis.com/archives/bugtraq/2002-07/0486.html http://www.iss.net/security_center/static/9756.php http://www.securityfocus.com/bid/5383 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 0

Buffer overflow in Sun AnswerBook2 1.4 through 1.4.3 allows remote attackers to execute arbitrary code via a long filename argument to the gettransbitmap CGI program. • http://marc.info/?l=bugtraq&m=102198846905064&w=2 http://marc.info/?l=vulnwatch&m=102194510509450&w=2 http://www.eSecurityOnline.com/advisories/eSO5063.asp http://www.iss.net/security_center/static/9117.php http://www.securityfocus.com/bid/4784 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 2

The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts, which allows remote attackers to add user accounts to the interface by directly calling the admin CGI script. • https://www.exploit-db.com/exploits/20144 http://archives.neohapsis.com/archives/sun/2000-q3/0001.html http://seclists.org/bugtraq/2000/Aug/0105.html http://www.s21sec.com/en/avisos/s21sec-004-en.txt http://www.securityfocus.com/bid/1554 https://exchange.xforce.ibmcloud.com/vulnerabilities/5069 •