Vulnerabilites related to sun - iplanet_web_server
cve-2001-0606
Vulnerability from cvelistv5
Published
2001-07-27 04:00
Modified
2024-08-08 04:30
Severity ?
Summary
Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:30:05.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "hp-virtualvault-iws-dos(6110)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6110"
          },
          {
            "name": "HPSBUX0102-139",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/hp/2001-q1/0041.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "hp-virtualvault-iws-dos(6110)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6110"
        },
        {
          "name": "HPSBUX0102-139",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/hp/2001-q1/0041.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0606",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "hp-virtualvault-iws-dos(6110)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6110"
            },
            {
              "name": "HPSBUX0102-139",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/hp/2001-q1/0041.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0606",
    "datePublished": "2001-07-27T04:00:00",
    "dateReserved": "2001-07-27T00:00:00",
    "dateUpdated": "2024-08-08T04:30:05.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1042
Vulnerability from cvelistv5
Published
2002-08-31 04:00
Modified
2024-08-08 03:12
Severity ?
Summary
Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:12:16.865Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020709 iPlanet Remote File Viewing",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html"
          },
          {
            "name": "iplanet-search-view-files(9517)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9517.php"
          },
          {
            "name": "5191",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5191"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\\ (dot-dot backslash) sequences in the NS-query-pat parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-09-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020709 iPlanet Remote File Viewing",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html"
        },
        {
          "name": "iplanet-search-view-files(9517)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9517.php"
        },
        {
          "name": "5191",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5191"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1042",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\\ (dot-dot backslash) sequences in the NS-query-pat parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020709 iPlanet Remote File Viewing",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html"
            },
            {
              "name": "iplanet-search-view-files(9517)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9517.php"
            },
            {
              "name": "5191",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5191"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1042",
    "datePublished": "2002-08-31T04:00:00",
    "dateReserved": "2002-08-27T00:00:00",
    "dateUpdated": "2024-08-08T03:12:16.865Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-2763
Vulnerability from cvelistv5
Published
2009-06-01 22:00
Modified
2024-09-17 00:11
Severity ?
Summary
The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:36:25.490Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#867593",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/867593"
          },
          {
            "name": "50603",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-06-01T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#867593",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/867593"
        },
        {
          "name": "50603",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2763",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#867593",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/867593"
            },
            {
              "name": "50603",
              "refsource": "SUNALERT",
              "url": "http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html"
            },
            {
              "name": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf",
              "refsource": "MISC",
              "url": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2763",
    "datePublished": "2009-06-01T22:00:00Z",
    "dateReserved": "2009-06-01T00:00:00Z",
    "dateUpdated": "2024-09-17T00:11:42.049Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-0183
Vulnerability from cvelistv5
Published
2007-01-11 02:00
Modified
2024-08-07 12:12
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
References
http://osvdb.org/32662vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/21977vdb-entry, x_refsource_BID
http://secunia.com/advisories/23605third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:12:17.138Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32662",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/32662"
          },
          {
            "name": "21977",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21977"
          },
          {
            "name": "23605",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23605"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32662",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/32662"
        },
        {
          "name": "21977",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21977"
        },
        {
          "name": "23605",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23605"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0183",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32662",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/32662"
            },
            {
              "name": "21977",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21977"
            },
            {
              "name": "23605",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23605"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0183",
    "datePublished": "2007-01-11T02:00:00",
    "dateReserved": "2007-01-10T00:00:00",
    "dateUpdated": "2024-08-07T12:12:17.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-01-12 05:04
Modified
2024-11-21 00:25
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D79D8B-71EC-41FB-B168-294A7553785F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "15614FEE-BE44-493D-8F4B-B68F90BA1C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EAFDD45B-9AA9-46A9-9452-6F7026DAB8B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "881584F0-6E53-4E08-A394-911CCD7179B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:enterprise:*:*:*:*:*",
              "matchCriteriaId": "74307012-2D6B-4D7E-BB6E-B6515E37149D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5608C463-921D-4640-B9F5-1C7E2F99DFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:enterprise:*:*:*:*:*",
              "matchCriteriaId": "CC15E6D1-5E34-4BA0-83AA-32843BBE34EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8A1FD-2B13-4D52-A685-822FC49D61D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:enterprise:*:*:*:*:*",
              "matchCriteriaId": "B199A631-70D8-4FA5-BFAA-46EA768223D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C8D8A-D9EC-4DB2-B2E2-3B3BFC6AF369",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:enterprise:*:*:*:*:*",
              "matchCriteriaId": "14BE8733-6B79-406D-8AD4-1A034D93CA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "4EA69FCA-EAD5-4BA9-8AF5-2FDC617B77E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:enterprise:*:*:*:*:*",
              "matchCriteriaId": "431E382F-3638-43FE-978E-6FB72C0406A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D84C0F92-BA3D-47E3-A89C-F7BFE70F1A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:enterprise:*:*:*:*:*",
              "matchCriteriaId": "E85940EC-E144-4B26-B2FB-A4985FE852C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "B05F9BD8-4A97-4E30-9D87-C54D2C688C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:enterprise:*:*:*:*:*",
              "matchCriteriaId": "8BFAEFD1-D6E0-4401-A81E-9B73DF6C4600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "30EBB2AE-CC19-455C-8338-DC99649128E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:enterprise:*:*:*:*:*",
              "matchCriteriaId": "271C69BC-E8B9-4E95-91F0-719FDC71E31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "E97E6E0E-88BA-4EF3-83D3-F3A49076C6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:enterprise:*:*:*:*:*",
              "matchCriteriaId": "38178E55-35F2-407E-906C-CDA706881684",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in /search in iPlanet Web Server 4.x allows remote attackers to inject arbitrary web script or HTML via the NS-max-records parameter.  NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en /search en iPlanet Web Server 4.x permite a atacantes remotos inyectar scripts web o HTML de su elecci\u00f3n a trav\u00e9s del par\u00e1metro NS-max-records.\r\nNOTA: El origen de esta informaci\u00f3n es desconocido; los detalles se han obtenido solamente de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2007-0183",
  "lastModified": "2024-11-21T00:25:11.540",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-12T05:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/32662"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23605"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/32662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/21977"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-06-01 22:30
Modified
2024-11-20 23:54
Severity ?
Summary
The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "15614FEE-BE44-493D-8F4B-B68F90BA1C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EAFDD45B-9AA9-46A9-9452-6F7026DAB8B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "881584F0-6E53-4E08-A394-911CCD7179B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:enterprise:*:*:*:*:*",
              "matchCriteriaId": "74307012-2D6B-4D7E-BB6E-B6515E37149D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp11:*:*:*:*:*:*",
              "matchCriteriaId": "1AA735E6-0E26-47E0-B779-8688B058847E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp11:enterprise:*:*:*:*:*",
              "matchCriteriaId": "2CACFD40-A33F-4C4C-8CC1-3111E3399D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp12:*:*:*:*:*:*",
              "matchCriteriaId": "17872BB7-BD29-4EB8-8270-97157B991336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp12:enterprise:*:*:*:*:*",
              "matchCriteriaId": "12A2A214-156B-4092-B72E-55875A068EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5608C463-921D-4640-B9F5-1C7E2F99DFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:enterprise:*:*:*:*:*",
              "matchCriteriaId": "CC15E6D1-5E34-4BA0-83AA-32843BBE34EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8A1FD-2B13-4D52-A685-822FC49D61D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:enterprise:*:*:*:*:*",
              "matchCriteriaId": "B199A631-70D8-4FA5-BFAA-46EA768223D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C8D8A-D9EC-4DB2-B2E2-3B3BFC6AF369",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:enterprise:*:*:*:*:*",
              "matchCriteriaId": "14BE8733-6B79-406D-8AD4-1A034D93CA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "4EA69FCA-EAD5-4BA9-8AF5-2FDC617B77E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:enterprise:*:*:*:*:*",
              "matchCriteriaId": "431E382F-3638-43FE-978E-6FB72C0406A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D84C0F92-BA3D-47E3-A89C-F7BFE70F1A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:enterprise:*:*:*:*:*",
              "matchCriteriaId": "E85940EC-E144-4B26-B2FB-A4985FE852C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "B05F9BD8-4A97-4E30-9D87-C54D2C688C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:enterprise:*:*:*:*:*",
              "matchCriteriaId": "8BFAEFD1-D6E0-4401-A81E-9B73DF6C4600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "30EBB2AE-CC19-455C-8338-DC99649128E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:enterprise:*:*:*:*:*",
              "matchCriteriaId": "271C69BC-E8B9-4E95-91F0-719FDC71E31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "E97E6E0E-88BA-4EF3-83D3-F3A49076C6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:enterprise:*:*:*:*:*",
              "matchCriteriaId": "38178E55-35F2-407E-906C-CDA706881684",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "7383260B-83F0-4915-BFF3-BAD5C3228B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "0F8A1D4E-B671-4ADA-B9EA-B01BF7C17F61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "53779E82-8FB9-498D-9E1C-4B7671E722D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C61702CF-2660-4CC0-9563-B0DCD363B9DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "A3AEFF59-9E04-497C-81B0-D664BA52AC4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33621D67-8191-42EE-8859-8B5FC30F935A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "0C6F8563-701E-4E54-A0C9-67E9DF74D60D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "4022E5C6-5651-45DD-AF73-89CF38E71D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*",
              "matchCriteriaId": "EEF4CFCE-DEEC-4652-A96F-0C7B5A88175A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*",
              "matchCriteriaId": "873034EA-B3C6-43E6-AE98-A04598D9A392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "AE01BAC9-DC57-4BC8-9BFB-9C7C94A516A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1CEA91AD-443D-4856-AC7A-3DDE0791134D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "07C1D4DC-252A-4602-A916-32E51CCA75B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "526D2FAD-4241-412C-8863-B273D3733153",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B8A796CB-D675-49FC-98BA-4D527211C70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "8693959B-7D5D-414B-8660-2A693AF24541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "1BDC4A06-33A1-4619-B870-7F2AF1D332F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "8A445032-AD7B-4971-B175-DF3183A4A12C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "38698A3B-9597-4BC9-B112-BB908C3DE86B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "78587B6D-2A95-4714-9632-4F75CD552E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "279FE555-E290-4B17-855D-781C9B58ED55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4493C646-DF4B-45C7-86F7-A71AC9B1CA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "689F0A9F-8F34-4958-B869-C4FB8BC02406",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n por defecto de Sun ONE/iPlanet Web Server v4.1 SP! al SP2 y v6.0 SP1 al SP5 responde a las peticiones HTTP TRACE, lo que puede permitir a atacantes remotos el robo de informaci\u00f3n usando ataques de seguimiento de trazas en sitios cruzados (XST) en aplicaciones vulnerables a ataques de ejecuci\u00f3n de secuencias de comandos en sitios cruzados."
    }
  ],
  "id": "CVE-2004-2763",
  "lastModified": "2024-11-20T23:54:09.850",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-06-01T22:30:00.217",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/867593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archive.cert.uni-stuttgart.de/uniras/2004/02/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/867593"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the NS-query-pat parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3577B789-DBB6-413D-B964-B32FE3E8CD8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D79D8B-71EC-41FB-B168-294A7553785F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "15614FEE-BE44-493D-8F4B-B68F90BA1C4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp1:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EAFDD45B-9AA9-46A9-9452-6F7026DAB8B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "881584F0-6E53-4E08-A394-911CCD7179B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp10:enterprise:*:*:*:*:*",
              "matchCriteriaId": "74307012-2D6B-4D7E-BB6E-B6515E37149D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5608C463-921D-4640-B9F5-1C7E2F99DFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp2:enterprise:*:*:*:*:*",
              "matchCriteriaId": "CC15E6D1-5E34-4BA0-83AA-32843BBE34EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1BB8A1FD-2B13-4D52-A685-822FC49D61D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp3:enterprise:*:*:*:*:*",
              "matchCriteriaId": "B199A631-70D8-4FA5-BFAA-46EA768223D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C8D8A-D9EC-4DB2-B2E2-3B3BFC6AF369",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp4:enterprise:*:*:*:*:*",
              "matchCriteriaId": "14BE8733-6B79-406D-8AD4-1A034D93CA21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "4EA69FCA-EAD5-4BA9-8AF5-2FDC617B77E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp5:enterprise:*:*:*:*:*",
              "matchCriteriaId": "431E382F-3638-43FE-978E-6FB72C0406A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D84C0F92-BA3D-47E3-A89C-F7BFE70F1A50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp6:enterprise:*:*:*:*:*",
              "matchCriteriaId": "E85940EC-E144-4B26-B2FB-A4985FE852C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "B05F9BD8-4A97-4E30-9D87-C54D2C688C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp7:enterprise:*:*:*:*:*",
              "matchCriteriaId": "8BFAEFD1-D6E0-4401-A81E-9B73DF6C4600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "30EBB2AE-CC19-455C-8338-DC99649128E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp8:enterprise:*:*:*:*:*",
              "matchCriteriaId": "271C69BC-E8B9-4E95-91F0-719FDC71E31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "E97E6E0E-88BA-4EF3-83D3-F3A49076C6AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:sp9:enterprise:*:*:*:*:*",
              "matchCriteriaId": "38178E55-35F2-407E-906C-CDA706881684",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "352D9910-BC83-44B2-B5C0-59B8F2C23142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F316ECED-A6E3-43AC-BA05-C42F2CB0D830",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "FA32646E-1014-47D1-9C96-6CD8F0B13480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "38698A3B-9597-4BC9-B112-BB908C3DE86B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in search engine for iPlanet web server 6.0 SP2 and 4.1 SP9, and Netscape Enterprise Server 3.6, when running on Windows platforms, allows remote attackers to read arbitrary files via ..\\ (dot-dot backslash) sequences in the NS-query-pat parameter."
    }
  ],
  "id": "CVE-2002-1042",
  "lastModified": "2024-11-20T23:40:27.553",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9517.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/5191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2002-07/0085.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9517.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/5191"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-08-22 04:00
Modified
2024-11-20 23:35
Severity ?
Summary
Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service.
Impacted products
Vendor Product Version
hp virtualvault 4.0
sun iplanet_web_server 4.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:virtualvault:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7179CB7C-CD63-421E-AD9E-0422020D7963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:iplanet_web_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D79D8B-71EC-41FB-B168-294A7553785F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vulnerability in iPlanet Web Server 4.X in HP-UX 11.04 (VVOS) with VirtualVault A.04.00 allows a remote attacker to create a denial of service via the HTTPS service."
    }
  ],
  "id": "CVE-2001-0606",
  "lastModified": "2024-11-20T23:35:45.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-08-22T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/hp/2001-q1/0041.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/hp/2001-q1/0041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6110"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}