20 results (0.003 seconds)

CVSS: 7.5EPSS: 95%CPEs: 1EXPL: 4

Buffer overflow in ext.dll in BadBlue 2.55 allows remote attackers to execute arbitrary code via a long mfcisapicommand parameter. • https://www.exploit-db.com/exploits/16761 https://www.exploit-db.com/exploits/845 http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0599.html http://secunia.com/advisories/14405 http://www.securityfocus.com/bid/12673 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

BadBlue 2.4 allows remote attackers to obtain the location of the server installation path via a request for phptest.php, which includes the pathname in the source of the resulting HTML. • https://www.exploit-db.com/exploits/23753 http://www.securityfocus.com/archive/1/355109 http://www.securityfocus.com/bid/9737 https://exchange.xforce.ibmcloud.com/vulnerabilities/15311 •

CVSS: 5.0EPSS: 7%CPEs: 1EXPL: 4

BadBlue 2.5 allows remote attackers to cause a denial of service (refuse HTTP connections) via a large number of connections from the same IP address. • https://www.exploit-db.com/exploits/419 http://marc.info/?l=bugtraq&m=109309119502208&w=2 http://secunia.com/advisories/12346 http://www.gulftech.org/?node=research&article_id=00043-08202004 http://www.securityfocus.com/bid/10983 https://exchange.xforce.ibmcloud.com/vulnerabilities/17064 •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 2

The ISAPI extension in BadBlue 1.7 through 2.2, and possibly earlier versions, modifies the first two letters of a filename extension after performing a security check, which allows remote attackers to bypass authentication via a filename with a .ats extension instead of a .hts extension. La extendisón ISAPI en BadBlue 1.7 hasta 2.2, y posiblemente versiones anteriores, modifica las dos primeras letras de la extensión de un archivo después de realizar comprobaciones de seguridad, lo que permite que atacantes remotos pasen la autentificación mediante un fichero .ats en lugar de uno .hts. • https://www.exploit-db.com/exploits/22620 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0075.html http://marc.info/?l=bugtraq&m=105346382524169&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

BadBlue 1.7 allows remote attackers to bypass password protections for directories and files via an HTTP request containing an extra / (slash). BadBlue 1.7 permiten a atacantes remotos eludir las protecciones de contraseñas en directorios y ficheros mediante una petición HTTP que contiene un caracter / (slash). • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0041.html http://www.iss.net/security_center/static/10466.php http://www.securityfocus.com/bid/6044 •