Vulnerabilites related to sun - java_system_web_proxy_server
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad View URL Database (Ver Base de Datos de URLs) en Sun Java System Web Proxy Server 4.x anterior a 4.0.6 y 3.x anterio a 3.6 SP11 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566309."
    }
  ],
  "id": "CVE-2007-6570",
  "lastModified": "2024-11-21T00:40:28.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-28T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/40851"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/40851"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors.
Impacted products
Vendor Product Version
sun java_system_web_proxy_server 3.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors."
    }
  ],
  "id": "CVE-2005-1232",
  "lastModified": "2024-11-20T23:56:53.850",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/82356"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/82356"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sun Java System Web Server 6.1 anterior al SP8 y 7.0 anterior al Update 1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566204."
    }
  ],
  "id": "CVE-2007-6572",
  "lastModified": "2024-11-21T00:40:28.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-28T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-29 20:30
Modified
2024-11-21 00:31
Severity ?
Summary
Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation.
Impacted products
Vendor Product Version
sun java_system_web_proxy_server *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F4D3BE-B872-4807-A16E-869763DF27EC",
              "versionEndIncluding": "4.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en el soporte de proxy SOCKS (sockd) en Sun Java Web Proxy Server anterior a 4.0.5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante paquetes manipulados durante la negociaci\u00f3n del protocolo."
    }
  ],
  "id": "CVE-2007-2881",
  "lastModified": "2024-11-21T00:31:53.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-29T20:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35841"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25405"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/746889"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1018130"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1957"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25405"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/746889"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018130"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2024-11-21 00:05
Severity ?
Summary
Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors."
    }
  ],
  "id": "CVE-2005-4806",
  "lastModified": "2024-11-21T00:05:13.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16757"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014875"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/1689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1014875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/1689"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-04 11:28
Modified
2024-11-21 00:22
Severity ?
Summary
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
cve@mitre.orghttp://secunia.com/advisories/23186Broken Link
cve@mitre.orghttp://securitytracker.com/id?1017322Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://securitytracker.com/id?1017323Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://securitytracker.com/id?1017324Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1Broken Link, Patch
cve@mitre.orghttp://www.securityfocus.com/bid/21371Broken Link, Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4793Broken Link
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30662Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23186Broken Link
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017322Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017323Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017324Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21371Broken Link, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4793Broken Link
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30662Third Party Advisory, VDB Entry



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAB26B3D-4DF0-45C2-9ECA-202C829392D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "721D0068-2664-4E92-9D96-9007F2120450",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9134A420-1A6E-48C0-A6CE-5AE555FC0D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "56BB3993-C089-421F-987E-D6294E8C909E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de contrabando de petici\u00f3n HTTP en Sun Java System Proxy Server anterior al 30/11/2006, cuando se usa con Sun Java System Application Server o Sun Java System Web Server, permite a atacantes remotos evitar el filtrado de petici\u00f3n HTTP, secuestrar sesiones web, realizar ataques de secuencias de comandos en sitios cruzados (XSS), y falsear la cach\u00e9 web mediante vectores de ataque no especificados."
    }
  ],
  "id": "CVE-2006-6276",
  "lastModified": "2024-11-21T00:22:19.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-04T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/23186"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017322"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017323"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017324"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/21371"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4793"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/23186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017322"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017323"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1017324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/21371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-444"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-27 14:30
Modified
2024-11-21 01:05
Severity ?
Summary
The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_access_manager_policy_agent:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56354C0A-A653-4458-8C9F-F3B8ACA40D85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request."
    },
    {
      "lang": "es",
      "value": "El modulo Sun Java System (SJS) Access Manager Policy Agent v2.2 para el servidor proxy web SJS v4.0 permite a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de una petici\u00f3n GET."
    }
  ],
  "id": "CVE-2009-2597",
  "lastModified": "2024-11-21T01:05:15.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-27T14:30:00.483",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35979"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-14 20:41
Modified
2024-11-21 00:49
Severity ?
Summary
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "AF24FBF9-6E01-40F6-889B-2EEF5D5ECDB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "0BFF3C73-D592-4DD2-8F1B-9908A2D4AA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "2B70E50B-6C01-4D57-A35D-3BB1F483372F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "309BFAF3-5842-4F4F-B6F9-73DBE428F387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "ED82028A-8BD5-4E24-85EA-B3ED719A0DB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A14869F3-76A8-4407-85C8-3D9764721EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "18658A61-81D2-4FDD-8DB2-8222CCCF85C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C0B02862-58BD-4D29-A2D1-3A7925FA8DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "BE09D9A5-4A81-4771-9D1F-E74845537486",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "B4B978A8-4D6D-4E1F-94FF-3ED6ECB584C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "399B9003-1841-4F68-ABD9-EFAF8FDAFADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "CE035EA8-4F06-4C14-9E27-8F1533D1433B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "9D93A98A-39F3-44C7-9150-90C3892508C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "D2B7A60C-89B5-4851-BE12-4196A6A4D616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "29307BC1-6FC6-4F82-9031-E7317B2AFE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "69CE3DFF-8BFD-45BF-BA2A-DB176BF17C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "4DB543F2-7DC6-4EED-92D3-EBC12E70AC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "559B8C70-F680-4578-9E68-258D91B41E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C7C836B7-564C-4EAD-A9EF-FB41C0533238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C06DE-0800-4A43-BEC1-B38811660DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "CF2CB27C-5F5A-4057-9B47-61365F0658C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "766DA0FE-CAA8-4946-A4AE-4E464D0D0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "67DBCAEE-BC63-4C92-8A91-839F475FBB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "13903015-75DD-4F12-9E9A-F12844CEA251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "C48458F0-E844-4654-B450-77E2BF97B047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "BDE95076-C3FF-41E0-A5A0-B70E779EAF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "4435E1C4-BAD3-4902-A5F0-3C024CE78766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "982A6037-F163-4F48-9CF9-D07D37824565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "5FB0CAFB-AA1A-408D-9436-CFDAB6985FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "848A771F-CB1D-49BC-A1D7-48C31AA91590",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad sin especificar en el subsistema de FTP en Sun Java System Web Proxy Server 4.0.5 antes de SP6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo al aceptar conexiones) a trav\u00e9s de vectores desconocidos, probablemente relacionados con el agotamiento de los descriptores de ficheros."
    }
  ],
  "id": "CVE-2008-3683",
  "lastModified": "2024-11-21T00:49:52.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-14T20:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31476"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30671"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020696"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2366"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/30671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020696"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sun Java System Web Proxy Server 3.6 anterior a SP11 sobre Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6611356."
    }
  ],
  "id": "CVE-2007-6571",
  "lastModified": "2024-11-21T00:40:28.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-28T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-10-13 20:00
Modified
2024-11-21 00:51
Severity ?
Summary
Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request.
Impacted products
Vendor Product Version
sun java_system_web_proxy_server 4.0
sun java_system_web_proxy_server 4.0
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.1
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.2
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.3
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.4
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.5
sun java_system_web_proxy_server 4.0.6
sun java_system_web_proxy_server 4.0.6
sun java_system_web_proxy_server 4.0.6
sun java_system_web_proxy_server 4.0.6
sun java_system_web_proxy_server 4.0.6
sun java_system_web_proxy_server 4.0.7
sun java_system_web_proxy_server 4.0.7
sun java_system_web_proxy_server 4.0.7
sun java_system_web_proxy_server 4.0.7
sun java_system_web_proxy_server 4.0.7
sun java_system_web_proxy_server 4.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EECC7DD-79F8-4189-91C7-2E8F5AB6A50F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "A14869F3-76A8-4407-85C8-3D9764721EF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "18658A61-81D2-4FDD-8DB2-8222CCCF85C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "C0B02862-58BD-4D29-A2D1-3A7925FA8DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "BE09D9A5-4A81-4771-9D1F-E74845537486",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "B4B978A8-4D6D-4E1F-94FF-3ED6ECB584C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D03FFC6C-1CDB-49ED-B693-DC53D87118C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "399B9003-1841-4F68-ABD9-EFAF8FDAFADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "CE035EA8-4F06-4C14-9E27-8F1533D1433B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "9D93A98A-39F3-44C7-9150-90C3892508C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "D2B7A60C-89B5-4851-BE12-4196A6A4D616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "29307BC1-6FC6-4F82-9031-E7317B2AFE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "1BAD5224-978C-4317-8FA2-FF56FF022E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "69CE3DFF-8BFD-45BF-BA2A-DB176BF17C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "4DB543F2-7DC6-4EED-92D3-EBC12E70AC0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "559B8C70-F680-4578-9E68-258D91B41E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "C7C836B7-564C-4EAD-A9EF-FB41C0533238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "3C5C06DE-0800-4A43-BEC1-B38811660DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "511AEA73-AECF-4ECF-9690-03BF516875E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "CF2CB27C-5F5A-4057-9B47-61365F0658C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "766DA0FE-CAA8-4946-A4AE-4E464D0D0D5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "67DBCAEE-BC63-4C92-8A91-839F475FBB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "13903015-75DD-4F12-9E9A-F12844CEA251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "C48458F0-E844-4654-B450-77E2BF97B047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "6CA00153-D1EF-44BE-9288-00D2358DA55F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "BDE95076-C3FF-41E0-A5A0-B70E779EAF77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "4435E1C4-BAD3-4902-A5F0-3C024CE78766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "982A6037-F163-4F48-9CF9-D07D37824565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "5FB0CAFB-AA1A-408D-9436-CFDAB6985FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "848A771F-CB1D-49BC-A1D7-48C31AA91590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B976BD9A-CC17-40DD-A167-FB549460AA17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "84FAC4BC-5A3F-41E6-B881-1ABB00C8167D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:linux:*:*:*:*:*",
              "matchCriteriaId": "61285CF6-F5BD-4C19-B288-1EF1A9AAFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "ED09307B-02D6-4861-8FF6-5EEC4CE257FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:windows:*:*:*:*:*",
              "matchCriteriaId": "48DEE6A3-3EED-408A-BC93-85BAB1EA336C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:x86:*:*:*:*:*",
              "matchCriteriaId": "1C1A1FDC-6DF3-45CF-A4B7-3847429C6C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4F13A0-8097-4A06-9989-F33918FE8ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "1693ED80-2CE6-4536-A0EA-E7D0C24FDF10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:linux:*:*:*:*:*",
              "matchCriteriaId": "FDB620CE-A4C0-4A49-8022-DA5FA40FFF3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "4BCF42A1-BAB1-40C8-959F-0AC16B542577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:windows:*:*:*:*:*",
              "matchCriteriaId": "82BBA16B-3F2F-49D3-99FC-4F3A45F1B68E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:x86:*:*:*:*:*",
              "matchCriteriaId": "A0C6FF56-864E-408C-AFDE-68D6DC7C6880",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el subsistema FTP en Sun Java System Web Proxy Server versiones 4.0 hasta 4.0.7, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n GET de HTTP  dise\u00f1ada."
    }
  ],
  "id": "CVE-2008-4541",
  "lastModified": "2024-11-21T00:51:55.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-13T20:00:02.307",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32227"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1021038"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/31691"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2781"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2781"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "E2C55657-79F3-4447-B827-EE443AB922CD",
              "versionEndIncluding": "4.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:linux:*:*:*:*:*",
              "matchCriteriaId": "6270A3A9-B5D1-4234-A3A4-AEF6ACE77932",
              "versionEndIncluding": "4.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "D609436F-B0C8-4ACF-82B7-84A73582EE08",
              "versionEndIncluding": "4.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:windows:*:*:*:*:*",
              "matchCriteriaId": "5552CC41-2A31-4339-B567-80C0BEDF520A",
              "versionEndIncluding": "4.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:x86:*:*:*:*:*",
              "matchCriteriaId": "EA6A7377-FF15-412A-BF34-C0E47030FE95",
              "versionEndIncluding": "4.0.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:aix:*:*:*:*:*",
              "matchCriteriaId": "845895BA-37A6-49A8-B37D-EC2CFF4B1042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "BF864FCC-8414-4481-9210-108EA3266FF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A3A51792-C4A9-4504-98A1-485DB2F480EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:windows:*:*:*:*:*",
              "matchCriteriaId": "58E16BFC-4A16-429B-A2B4-DB1EB29004F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:aix:*:*:*:*:*",
              "matchCriteriaId": "E8E7D327-AB45-4DDC-A6B5-4A413B76440F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "5318A317-0981-4A5D-9468-50E08219312B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "A695E901-4FFF-4660-B49E-D7CB139536D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "24754087-DC84-4B0B-BBDE-70D288AFC901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DCFD3C8D-6E79-4DA6-A600-D952C8E5A151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:x86:*:*:*:*:*",
              "matchCriteriaId": "16E496C0-438E-4262-A54B-3CB69C4A88C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:hp_ux:*:*:*:*:*",
              "matchCriteriaId": "134929FE-2EBA-4B55-904F-111A658160F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "4AB42DB5-10BA-454E-A9F5-A0581BD21FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "53671389-3822-41CD-ABC9-DC19871579AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:windows:*:*:*:*:*",
              "matchCriteriaId": "F69C48CB-A038-431D-ABE4-A216E5283266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:x86:*:*:*:*:*",
              "matchCriteriaId": "6EEB898B-0036-4B7B-B15A-595487D09D72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad View Error Log (Ver Registro de Errores) en Sun Java System Web Proxy Server 4.x anterior a 4.0.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566246."
    }
  ],
  "id": "CVE-2007-6569",
  "lastModified": "2024-11-21T00:40:28.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-12-28T21:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/28186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/28186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/26978"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4313"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-10-30 04:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests.
References
cve@mitre.orghttp://secunia.com/advisories/13036/Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1012005Patch, Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1&searchclause=security
cve@mitre.orghttp://www.auscert.org.au/render.html?it=4516
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/p-027.shtml
cve@mitre.orghttp://www.kb.cert.org/vuls/id/964401US Government Resource
cve@mitre.orghttp://www.osvdb.org/displayvuln.php?osvdb_id=11304Patch, Vendor Advisory
cve@mitre.orghttp://www.pentest.co.uk/documents/ptl-2004-06.html
cve@mitre.orghttp://www.securityfocus.com/bid/11566Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17920
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13036/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1012005Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1&searchclause=security
af854a3a-2127-422b-91ae-364da2661108http://www.auscert.org.au/render.html?it=4516
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/p-027.shtml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/964401US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/displayvuln.php?osvdb_id=11304Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.pentest.co.uk/documents/ptl-2004-06.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11566Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17920



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests."
    }
  ],
  "id": "CVE-2004-1350",
  "lastModified": "2024-11-20T23:50:39.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-10-30T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13036/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1012005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.auscert.org.au/render.html?it=4516"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/964401"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11566"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13036/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1012005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.auscert.org.au/render.html?it=4516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/964401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2004-1350
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests.
References
http://www.securityfocus.com/bid/11566vdb-entry, x_refsource_BID
http://securitytracker.com/id?1012005vdb-entry, x_refsource_SECTRACK
http://www.pentest.co.uk/documents/ptl-2004-06.htmlx_refsource_MISC
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1&searchclause=securityvendor-advisory, x_refsource_SUNALERT
http://www.kb.cert.org/vuls/id/964401third-party-advisory, x_refsource_CERT-VN
http://www.ciac.org/ciac/bulletins/p-027.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.auscert.org.au/render.html?it=4516third-party-advisory, x_refsource_AUSCERT
http://www.osvdb.org/displayvuln.php?osvdb_id=11304vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/13036/third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/17920vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.342Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "11566",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11566"
          },
          {
            "name": "1012005",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012005"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html"
          },
          {
            "name": "57606",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security"
          },
          {
            "name": "VU#964401",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/964401"
          },
          {
            "name": "P-027",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml"
          },
          {
            "name": "ESB-2004.0691",
            "tags": [
              "third-party-advisory",
              "x_refsource_AUSCERT",
              "x_transferred"
            ],
            "url": "http://www.auscert.org.au/render.html?it=4516"
          },
          {
            "name": "11304",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
          },
          {
            "name": "13036",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13036/"
          },
          {
            "name": "sun-web-proxy-bo(17920)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-10-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "11566",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11566"
        },
        {
          "name": "1012005",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012005"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html"
        },
        {
          "name": "57606",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security"
        },
        {
          "name": "VU#964401",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/964401"
        },
        {
          "name": "P-027",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml"
        },
        {
          "name": "ESB-2004.0691",
          "tags": [
            "third-party-advisory",
            "x_refsource_AUSCERT"
          ],
          "url": "http://www.auscert.org.au/render.html?it=4516"
        },
        {
          "name": "11304",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
        },
        {
          "name": "13036",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13036/"
        },
        {
          "name": "sun-web-proxy-bo(17920)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1350",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "11566",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11566"
            },
            {
              "name": "1012005",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012005"
            },
            {
              "name": "http://www.pentest.co.uk/documents/ptl-2004-06.html",
              "refsource": "MISC",
              "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html"
            },
            {
              "name": "57606",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security"
            },
            {
              "name": "VU#964401",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/964401"
            },
            {
              "name": "P-027",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml"
            },
            {
              "name": "ESB-2004.0691",
              "refsource": "AUSCERT",
              "url": "http://www.auscert.org.au/render.html?it=4516"
            },
            {
              "name": "11304",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304"
            },
            {
              "name": "13036",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13036/"
            },
            {
              "name": "sun-web-proxy-bo(17920)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1350",
    "datePublished": "2005-01-19T05:00:00",
    "dateReserved": "2005-01-06T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-4806
Vulnerability from cvelistv5
Published
2006-05-25 10:00
Modified
2024-08-08 00:01
Severity ?
Summary
Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors.
References
http://securitytracker.com/id?1014875vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2005/1689vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/16757third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1vendor-advisory, x_refsource_SUNALERT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:01:23.538Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014875",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014875"
          },
          {
            "name": "ADV-2005-1689",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/1689"
          },
          {
            "name": "16757",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16757"
          },
          {
            "name": "101913",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014875",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014875"
        },
        {
          "name": "ADV-2005-1689",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/1689"
        },
        {
          "name": "16757",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16757"
        },
        {
          "name": "101913",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4806",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014875",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014875"
            },
            {
              "name": "ADV-2005-1689",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/1689"
            },
            {
              "name": "16757",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16757"
            },
            {
              "name": "101913",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4806",
    "datePublished": "2006-05-25T10:00:00",
    "dateReserved": "2006-05-25T00:00:00",
    "dateUpdated": "2024-08-08T00:01:23.538Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6571
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356.
References
http://www.securityfocus.com/bid/26978vdb-entry, x_refsource_BID
http://secunia.com/advisories/28216third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1vendor-advisory, x_refsource_SUNALERT
https://exchange.xforce.ibmcloud.com/vulnerabilities/43977vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2007/4313vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:06.056Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26978",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26978"
          },
          {
            "name": "28216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28216"
          },
          {
            "name": "103002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
          },
          {
            "name": "javasystem-proxy-unspecified-xss(43977)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977"
          },
          {
            "name": "ADV-2007-4313",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26978",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26978"
        },
        {
          "name": "28216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28216"
        },
        {
          "name": "103002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
        },
        {
          "name": "javasystem-proxy-unspecified-xss(43977)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977"
        },
        {
          "name": "ADV-2007-4313",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6571",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26978",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26978"
            },
            {
              "name": "28216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28216"
            },
            {
              "name": "103002",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
            },
            {
              "name": "javasystem-proxy-unspecified-xss(43977)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977"
            },
            {
              "name": "ADV-2007-4313",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6571",
    "datePublished": "2007-12-28T21:00:00",
    "dateReserved": "2007-12-28T00:00:00",
    "dateUpdated": "2024-08-07T16:11:06.056Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2881
Vulnerability from cvelistv5
Published
2007-05-29 20:00
Modified
2024-08-07 13:57
Severity ?
Summary
Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation.
References
http://www.vupen.com/english/advisories/2007/1957vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/34524vdb-entry, x_refsource_XF
http://secunia.com/advisories/25405third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/35841vdb-entry, x_refsource_OSVDB
http://www.kb.cert.org/vuls/id/746889third-party-advisory, x_refsource_CERT-VN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1vendor-advisory, x_refsource_SUNALERT
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536third-party-advisory, x_refsource_IDEFENSE
http://www.securitytracker.com/id?1018130vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/24165vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:57:54.312Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-1957",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1957"
          },
          {
            "name": "sun-java-web-socks-bo(34524)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
          },
          {
            "name": "25405",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25405"
          },
          {
            "name": "35841",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35841"
          },
          {
            "name": "VU#746889",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/746889"
          },
          {
            "name": "102927",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
          },
          {
            "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
          },
          {
            "name": "1018130",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018130"
          },
          {
            "name": "24165",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24165"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-1957",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1957"
        },
        {
          "name": "sun-java-web-socks-bo(34524)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
        },
        {
          "name": "25405",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25405"
        },
        {
          "name": "35841",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35841"
        },
        {
          "name": "VU#746889",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/746889"
        },
        {
          "name": "102927",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
        },
        {
          "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
        },
        {
          "name": "1018130",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018130"
        },
        {
          "name": "24165",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24165"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-1957",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1957"
            },
            {
              "name": "sun-java-web-socks-bo(34524)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
            },
            {
              "name": "25405",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25405"
            },
            {
              "name": "35841",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35841"
            },
            {
              "name": "VU#746889",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/746889"
            },
            {
              "name": "102927",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
            },
            {
              "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
            },
            {
              "name": "1018130",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018130"
            },
            {
              "name": "24165",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24165"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2881",
    "datePublished": "2007-05-29T20:00:00",
    "dateReserved": "2007-05-29T00:00:00",
    "dateUpdated": "2024-08-07T13:57:54.312Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2597
Vulnerability from cvelistv5
Published
2009-07-27 14:22
Modified
2024-09-17 03:18
Severity ?
Summary
The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request.
References
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/35979third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:59:56.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1"
          },
          {
            "name": "258508",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1"
          },
          {
            "name": "35979",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35979"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-07-27T14:22:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1"
        },
        {
          "name": "258508",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1"
        },
        {
          "name": "35979",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35979"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2597",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1",
              "refsource": "CONFIRM",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1"
            },
            {
              "name": "258508",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1"
            },
            {
              "name": "35979",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35979"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2597",
    "datePublished": "2009-07-27T14:22:00Z",
    "dateReserved": "2009-07-27T00:00:00Z",
    "dateUpdated": "2024-09-17T03:18:16.145Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-1232
Vulnerability from cvelistv5
Published
2005-04-24 04:00
Modified
2024-08-07 21:44
Severity ?
Summary
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors.
References
http://www.securityfocus.com/bid/82356vdb-entry, x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1vendor-advisory, x_refsource_SUNALERT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:44:05.398Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "82356",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/82356"
          },
          {
            "name": "57763",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-04-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "82356",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/82356"
        },
        {
          "name": "57763",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1232",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "82356",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/82356"
            },
            {
              "name": "57763",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1232",
    "datePublished": "2005-04-24T04:00:00",
    "dateReserved": "2005-04-24T00:00:00",
    "dateUpdated": "2024-08-07T21:44:05.398Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4541
Vulnerability from cvelistv5
Published
2008-10-13 18:00
Modified
2024-08-07 10:17
Severity ?
Summary
Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/45782vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/31691vdb-entry, x_refsource_BID
http://secunia.com/advisories/32227third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1021038vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2781vdb-entry, x_refsource_VUPEN
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747third-party-advisory, x_refsource_IDEFENSE
http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1vendor-advisory, x_refsource_SUNALERT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.876Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "sun-webproxy-ftp-bo(45782)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782"
          },
          {
            "name": "31691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31691"
          },
          {
            "name": "32227",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32227"
          },
          {
            "name": "1021038",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021038"
          },
          {
            "name": "ADV-2008-2781",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2781"
          },
          {
            "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747"
          },
          {
            "name": "242986",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "sun-webproxy-ftp-bo(45782)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782"
        },
        {
          "name": "31691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31691"
        },
        {
          "name": "32227",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32227"
        },
        {
          "name": "1021038",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021038"
        },
        {
          "name": "ADV-2008-2781",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2781"
        },
        {
          "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747"
        },
        {
          "name": "242986",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4541",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "sun-webproxy-ftp-bo(45782)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782"
            },
            {
              "name": "31691",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31691"
            },
            {
              "name": "32227",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32227"
            },
            {
              "name": "1021038",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021038"
            },
            {
              "name": "ADV-2008-2781",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2781"
            },
            {
              "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow",
              "refsource": "IDEFENSE",
              "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747"
            },
            {
              "name": "242986",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4541",
    "datePublished": "2008-10-13T18:00:00",
    "dateReserved": "2008-10-13T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.876Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-3683
Vulnerability from cvelistv5
Published
2008-08-14 20:00
Modified
2024-08-07 09:45
Severity ?
Summary
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/44413vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/30671vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2008/2366vdb-entry, x_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/31476third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1020696vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:45:19.055Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "sun-webproxy-ftp-dos(44413)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413"
          },
          {
            "name": "30671",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30671"
          },
          {
            "name": "ADV-2008-2366",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2366"
          },
          {
            "name": "240327",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1"
          },
          {
            "name": "31476",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31476"
          },
          {
            "name": "1020696",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "sun-webproxy-ftp-dos(44413)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413"
        },
        {
          "name": "30671",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30671"
        },
        {
          "name": "ADV-2008-2366",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2366"
        },
        {
          "name": "240327",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1"
        },
        {
          "name": "31476",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31476"
        },
        {
          "name": "1020696",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020696"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3683",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "sun-webproxy-ftp-dos(44413)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413"
            },
            {
              "name": "30671",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30671"
            },
            {
              "name": "ADV-2008-2366",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2366"
            },
            {
              "name": "240327",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1"
            },
            {
              "name": "31476",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31476"
            },
            {
              "name": "1020696",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020696"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3683",
    "datePublished": "2008-08-14T20:00:00",
    "dateReserved": "2008-08-14T00:00:00",
    "dateUpdated": "2024-08-07T09:45:19.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-6276
Vulnerability from cvelistv5
Published
2006-12-04 11:00
Modified
2024-08-07 20:19
Severity ?
Summary
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/23186third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1017324vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/4793vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/21371vdb-entry, x_refsource_BID
http://securitytracker.com/id?1017323vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1017322vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:35.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "102733",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1"
          },
          {
            "name": "23186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23186"
          },
          {
            "name": "1017324",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017324"
          },
          {
            "name": "sunserver-proxy-csrf(30662)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662"
          },
          {
            "name": "ADV-2006-4793",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4793"
          },
          {
            "name": "21371",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21371"
          },
          {
            "name": "1017323",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017323"
          },
          {
            "name": "1017322",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017322"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "102733",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1"
        },
        {
          "name": "23186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23186"
        },
        {
          "name": "1017324",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017324"
        },
        {
          "name": "sunserver-proxy-csrf(30662)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662"
        },
        {
          "name": "ADV-2006-4793",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4793"
        },
        {
          "name": "21371",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21371"
        },
        {
          "name": "1017323",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017323"
        },
        {
          "name": "1017322",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017322"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6276",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "102733",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1"
            },
            {
              "name": "23186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23186"
            },
            {
              "name": "1017324",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017324"
            },
            {
              "name": "sunserver-proxy-csrf(30662)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662"
            },
            {
              "name": "ADV-2006-4793",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4793"
            },
            {
              "name": "21371",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21371"
            },
            {
              "name": "1017323",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017323"
            },
            {
              "name": "1017322",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017322"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6276",
    "datePublished": "2006-12-04T11:00:00",
    "dateReserved": "2006-12-03T00:00:00",
    "dateUpdated": "2024-08-07T20:19:35.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6569
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246.
References
http://www.securityfocus.com/bid/26978vdb-entry, x_refsource_BID
http://secunia.com/advisories/28216third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/28186third-party-advisory, x_refsource_SECUNIA
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=viewx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/4313vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:06.027Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26978",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26978"
          },
          {
            "name": "28216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28216"
          },
          {
            "name": "103002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
          },
          {
            "name": "28186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28186"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
          },
          {
            "name": "ADV-2007-4313",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-01-04T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26978",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26978"
        },
        {
          "name": "28216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28216"
        },
        {
          "name": "103002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
        },
        {
          "name": "28186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28186"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
        },
        {
          "name": "ADV-2007-4313",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6569",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26978",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26978"
            },
            {
              "name": "28216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28216"
            },
            {
              "name": "103002",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
            },
            {
              "name": "28186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28186"
            },
            {
              "name": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view",
              "refsource": "CONFIRM",
              "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
            },
            {
              "name": "ADV-2007-4313",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6569",
    "datePublished": "2007-12-28T21:00:00",
    "dateReserved": "2007-12-28T00:00:00",
    "dateUpdated": "2024-08-07T16:11:06.027Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6572
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/43978vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/26978vdb-entry, x_refsource_BID
http://secunia.com/advisories/28216third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1vendor-advisory, x_refsource_SUNALERT
http://www.vupen.com/english/advisories/2007/4313vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:06.088Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "javasystem-unspecified-xss(43978)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978"
          },
          {
            "name": "26978",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26978"
          },
          {
            "name": "28216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28216"
          },
          {
            "name": "103002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
          },
          {
            "name": "ADV-2007-4313",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "javasystem-unspecified-xss(43978)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978"
        },
        {
          "name": "26978",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26978"
        },
        {
          "name": "28216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28216"
        },
        {
          "name": "103002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
        },
        {
          "name": "ADV-2007-4313",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6572",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "javasystem-unspecified-xss(43978)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978"
            },
            {
              "name": "26978",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26978"
            },
            {
              "name": "28216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28216"
            },
            {
              "name": "103002",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
            },
            {
              "name": "ADV-2007-4313",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6572",
    "datePublished": "2007-12-28T21:00:00",
    "dateReserved": "2007-12-28T00:00:00",
    "dateUpdated": "2024-08-07T16:11:06.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6570
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309.
References
http://www.securityfocus.com/bid/26978vdb-entry, x_refsource_BID
http://secunia.com/advisories/28216third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/28186third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/43976vdb-entry, x_refsource_XF
http://osvdb.org/40851vdb-entry, x_refsource_OSVDB
http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247x_refsource_CONFIRM
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=viewx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/4313vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:06.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26978",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26978"
          },
          {
            "name": "28216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28216"
          },
          {
            "name": "103002",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
          },
          {
            "name": "28186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28186"
          },
          {
            "name": "javasystem-proxy-viewurl-xss(43976)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976"
          },
          {
            "name": "40851",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/40851"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
          },
          {
            "name": "ADV-2007-4313",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26978",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26978"
        },
        {
          "name": "28216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28216"
        },
        {
          "name": "103002",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
        },
        {
          "name": "28186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28186"
        },
        {
          "name": "javasystem-proxy-viewurl-xss(43976)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976"
        },
        {
          "name": "40851",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/40851"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
        },
        {
          "name": "ADV-2007-4313",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6570",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26978",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26978"
            },
            {
              "name": "28216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28216"
            },
            {
              "name": "103002",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1"
            },
            {
              "name": "28186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28186"
            },
            {
              "name": "javasystem-proxy-viewurl-xss(43976)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976"
            },
            {
              "name": "40851",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/40851"
            },
            {
              "name": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247",
              "refsource": "CONFIRM",
              "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247"
            },
            {
              "name": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view",
              "refsource": "CONFIRM",
              "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view"
            },
            {
              "name": "ADV-2007-4313",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6570",
    "datePublished": "2007-12-28T21:00:00",
    "dateReserved": "2007-12-28T00:00:00",
    "dateUpdated": "2024-08-07T16:11:06.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}