Vulnerabilites related to sun - java_system_web_proxy_server
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*", "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*", "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*", "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*", "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*", "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*", "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*", "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad View URL Database (Ver Base de Datos de URLs) en Sun Java System Web Proxy Server 4.x anterior a 4.0.6 y 3.x anterio a 3.6 SP11 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566309." } ], "id": "CVE-2007-6570", "lastModified": "2024-11-21T00:40:28.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-28T21:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "source": "cve@mitre.org", "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/40851" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28186" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28216" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/40851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_web_proxy_server | 3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors." } ], "id": "CVE-2005-1232", "lastModified": "2024-11-20T23:56:53.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/82356" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/82356" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*", "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*", "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*", "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*", "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*", "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*", "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*", "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sun Java System Web Server 6.1 anterior al SP8 y 7.0 anterior al Update 1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566204." } ], "id": "CVE-2007-6572", "lastModified": "2024-11-21T00:40:28.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-28T21:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28216" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-29 20:30
Modified
2024-11-21 00:31
Severity ?
Summary
Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_web_proxy_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "60F4D3BE-B872-4807-A16E-869763DF27EC", "versionEndIncluding": "4.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en el soporte de proxy SOCKS (sockd) en Sun Java Web Proxy Server anterior a 4.0.5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante paquetes manipulados durante la negociaci\u00f3n del protocolo." } ], "id": "CVE-2007-2881", "lastModified": "2024-11-21T00:31:53.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-29T20:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35841" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25405" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/746889" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24165" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018130" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1957" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/746889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2024-11-21 00:05
Severity ?
Summary
Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*", "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*", "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors." } ], "id": "CVE-2005-4806", "lastModified": "2024-11-21T00:05:13.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16757" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014875" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/1689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1014875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/1689" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-04 11:28
Modified
2024-11-21 00:22
Severity ?
Summary
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_application_server | 7.0 | |
sun | java_system_application_server | 8.1 | |
sun | java_system_web_proxy_server | - | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 4.0 | |
sun | java_system_web_server | 6.0 | |
sun | java_system_web_server | 6.1 | |
sun | one_application_server | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAB26B3D-4DF0-45C2-9ECA-202C829392D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "721D0068-2664-4E92-9D96-9007F2120450", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "9134A420-1A6E-48C0-A6CE-5AE555FC0D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "56BB3993-C089-421F-987E-D6294E8C909E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors." }, { "lang": "es", "value": "Vulnerabilidad de contrabando de petici\u00f3n HTTP en Sun Java System Proxy Server anterior al 30/11/2006, cuando se usa con Sun Java System Application Server o Sun Java System Web Server, permite a atacantes remotos evitar el filtrado de petici\u00f3n HTTP, secuestrar sesiones web, realizar ataques de secuencias de comandos en sitios cruzados (XSS), y falsear la cach\u00e9 web mediante vectores de ataque no especificados." } ], "id": "CVE-2006-6276", "lastModified": "2024-11-21T00:22:19.533", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-04T11:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/23186" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017322" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017323" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017324" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/21371" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2006/4793" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/23186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1017324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/21371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2006/4793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-444" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-27 14:30
Modified
2024-11-21 01:05
Severity ?
Summary
The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_access_manager_policy_agent | 2.2 | |
sun | java_system_web_proxy_server | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_access_manager_policy_agent:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "56354C0A-A653-4458-8C9F-F3B8ACA40D85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request." }, { "lang": "es", "value": "El modulo Sun Java System (SJS) Access Manager Policy Agent v2.2 para el servidor proxy web SJS v4.0 permite a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda de demonio) a trav\u00e9s de una petici\u00f3n GET." } ], "id": "CVE-2009-2597", "lastModified": "2024-11-21T01:05:15.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-27T14:30:00.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35979" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-08-14 20:41
Modified
2024-11-21 00:49
Severity ?
Summary
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp1:*:*:*:*:*:*", "matchCriteriaId": "AF24FBF9-6E01-40F6-889B-2EEF5D5ECDB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp2:*:*:*:*:*:*", "matchCriteriaId": "0BFF3C73-D592-4DD2-8F1B-9908A2D4AA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp3:*:*:*:*:*:*", "matchCriteriaId": "2B70E50B-6C01-4D57-A35D-3BB1F483372F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp4:*:*:*:*:*:*", "matchCriteriaId": "309BFAF3-5842-4F4F-B6F9-73DBE428F387", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp5:*:*:*:*:*:*", "matchCriteriaId": "ED82028A-8BD5-4E24-85EA-B3ED719A0DB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A14869F3-76A8-4407-85C8-3D9764721EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "18658A61-81D2-4FDD-8DB2-8222CCCF85C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "C0B02862-58BD-4D29-A2D1-3A7925FA8DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "BE09D9A5-4A81-4771-9D1F-E74845537486", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "B4B978A8-4D6D-4E1F-94FF-3ED6ECB584C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "399B9003-1841-4F68-ABD9-EFAF8FDAFADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "CE035EA8-4F06-4C14-9E27-8F1533D1433B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp3:*:*:*:*:*:*", "matchCriteriaId": "9D93A98A-39F3-44C7-9150-90C3892508C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp4:*:*:*:*:*:*", "matchCriteriaId": "D2B7A60C-89B5-4851-BE12-4196A6A4D616", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp5:*:*:*:*:*:*", "matchCriteriaId": "29307BC1-6FC6-4F82-9031-E7317B2AFE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp1:*:*:*:*:*:*", "matchCriteriaId": "69CE3DFF-8BFD-45BF-BA2A-DB176BF17C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp2:*:*:*:*:*:*", "matchCriteriaId": "4DB543F2-7DC6-4EED-92D3-EBC12E70AC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp3:*:*:*:*:*:*", "matchCriteriaId": "559B8C70-F680-4578-9E68-258D91B41E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp4:*:*:*:*:*:*", "matchCriteriaId": "C7C836B7-564C-4EAD-A9EF-FB41C0533238", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp5:*:*:*:*:*:*", "matchCriteriaId": "3C5C06DE-0800-4A43-BEC1-B38811660DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp1:*:*:*:*:*:*", "matchCriteriaId": "CF2CB27C-5F5A-4057-9B47-61365F0658C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp2:*:*:*:*:*:*", "matchCriteriaId": "766DA0FE-CAA8-4946-A4AE-4E464D0D0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp3:*:*:*:*:*:*", "matchCriteriaId": "67DBCAEE-BC63-4C92-8A91-839F475FBB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp4:*:*:*:*:*:*", "matchCriteriaId": "13903015-75DD-4F12-9E9A-F12844CEA251", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp5:*:*:*:*:*:*", "matchCriteriaId": "C48458F0-E844-4654-B450-77E2BF97B047", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "BDE95076-C3FF-41E0-A5A0-B70E779EAF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "4435E1C4-BAD3-4902-A5F0-3C024CE78766", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "982A6037-F163-4F48-9CF9-D07D37824565", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp4:*:*:*:*:*:*", "matchCriteriaId": "5FB0CAFB-AA1A-408D-9436-CFDAB6985FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp5:*:*:*:*:*:*", "matchCriteriaId": "848A771F-CB1D-49BC-A1D7-48C31AA91590", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors." }, { "lang": "es", "value": "Una vulnerabilidad sin especificar en el subsistema de FTP en Sun Java System Web Proxy Server 4.0.5 antes de SP6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo al aceptar conexiones) a trav\u00e9s de vectores desconocidos, probablemente relacionados con el agotamiento de los descriptores de ficheros." } ], "id": "CVE-2008-3683", "lastModified": "2024-11-21T00:49:52.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-14T20:41:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31476" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30671" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020696" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/31476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/30671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp10:*:*:*:*:*:*", "matchCriteriaId": "072BE21F-E09B-4087-83A0-44E9570AF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*", "matchCriteriaId": "66EA6738-9134-402C-AA74-68298F45B60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*", "matchCriteriaId": "4AB54F05-CBE0-4A3B-9941-A5509BF40EA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*", "matchCriteriaId": "BBA027B0-8996-4CBF-881D-D393C3508944", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp8:*:*:*:*:*:*", "matchCriteriaId": "B53D14F8-67E5-480F-A87F-CCBCDA6F62E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp9:*:*:*:*:*:*", "matchCriteriaId": "B71E5861-FC0F-4FEC-AFE5-11F00A1D608E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E592549-5C28-4F0A-B407-06A33B3CFFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "57DC2FBE-6556-4113-83BF-ABCAC70CBDE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp10:*:*:*:*:*:*", "matchCriteriaId": "4537E2AF-3E9F-40F2-8D20-CEFD2FF289C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "3DA512F0-B382-407E-B75D-5D2D15E185BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "16727FF1-3CD7-4667-A2BA-2241A3AFEED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "F60E165E-5B62-4D46-941D-E84603516D23", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "FF6BCC24-EADB-4EB8-9142-01D34C307C45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "05017BA4-C9FC-4F7D-A5FE-9CE763CFE3E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "DCC700F7-8675-441A-8AB7-CEFF84639E7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "7BE04EB1-CDBD-4AA2-9513-826637F14771", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*", "matchCriteriaId": "EBD38B0A-EB9B-4556-B6DE-A7598ACC04AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "044D96F6-7A18-4295-A665-16F1A6630963", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "85A181D1-C261-4C29-BC8C-A7A815A63E2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "3A10F68F-4A2F-44A0-A039-1A34C6E2D083", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "021DC080-18ED-41F4-9FBD-1DD0C332F871", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "C878B2FD-88A1-44E2-9234-C40CA1DDC5BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "BABE9BB1-E968-4EC9-A13A-6ECBCDC0D9AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "B6606659-59FE-4E17-9643-2267223DE6F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "9BC77D08-B591-4824-AC47-F14F4F53C63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFAA741F-6B77-44E5-8B84-AB5E49901BD1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sun Java System Web Proxy Server 3.6 anterior a SP11 sobre Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6611356." } ], "id": "CVE-2007-6571", "lastModified": "2024-11-21T00:40:28.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-28T21:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28216" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-13 20:00
Modified
2024-11-21 00:51
Severity ?
Summary
Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB8D89B7-2C74-4CDC-8708-D9FACC4DE7C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "927171C0-E754-4FC1-AA9F-6565ADE2B63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3EECC7DD-79F8-4189-91C7-2E8F5AB6A50F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "A14869F3-76A8-4407-85C8-3D9764721EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "18658A61-81D2-4FDD-8DB2-8222CCCF85C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "C0B02862-58BD-4D29-A2D1-3A7925FA8DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "BE09D9A5-4A81-4771-9D1F-E74845537486", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "B4B978A8-4D6D-4E1F-94FF-3ED6ECB584C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "D03FFC6C-1CDB-49ED-B693-DC53D87118C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1C4E0-1EB0-4CDE-90D5-1A600BCBA93F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp1:*:*:*:*:*:*", "matchCriteriaId": "399B9003-1841-4F68-ABD9-EFAF8FDAFADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp2:*:*:*:*:*:*", "matchCriteriaId": "CE035EA8-4F06-4C14-9E27-8F1533D1433B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp3:*:*:*:*:*:*", "matchCriteriaId": "9D93A98A-39F3-44C7-9150-90C3892508C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp4:*:*:*:*:*:*", "matchCriteriaId": "D2B7A60C-89B5-4851-BE12-4196A6A4D616", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp5:*:*:*:*:*:*", "matchCriteriaId": "29307BC1-6FC6-4F82-9031-E7317B2AFE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp6:*:*:*:*:*:*", "matchCriteriaId": "1BAD5224-978C-4317-8FA2-FF56FF022E68", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CC07AB3E-09D4-47B2-B065-8E5A73775982", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp1:*:*:*:*:*:*", "matchCriteriaId": "69CE3DFF-8BFD-45BF-BA2A-DB176BF17C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp2:*:*:*:*:*:*", "matchCriteriaId": "4DB543F2-7DC6-4EED-92D3-EBC12E70AC0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp3:*:*:*:*:*:*", "matchCriteriaId": "559B8C70-F680-4578-9E68-258D91B41E9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp4:*:*:*:*:*:*", "matchCriteriaId": "C7C836B7-564C-4EAD-A9EF-FB41C0533238", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp5:*:*:*:*:*:*", "matchCriteriaId": "3C5C06DE-0800-4A43-BEC1-B38811660DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp6:*:*:*:*:*:*", "matchCriteriaId": "511AEA73-AECF-4ECF-9690-03BF516875E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "97EB8961-9F4D-498D-B2C7-421175F8FE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp1:*:*:*:*:*:*", "matchCriteriaId": "CF2CB27C-5F5A-4057-9B47-61365F0658C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp2:*:*:*:*:*:*", "matchCriteriaId": "766DA0FE-CAA8-4946-A4AE-4E464D0D0D5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp3:*:*:*:*:*:*", "matchCriteriaId": "67DBCAEE-BC63-4C92-8A91-839F475FBB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp4:*:*:*:*:*:*", "matchCriteriaId": "13903015-75DD-4F12-9E9A-F12844CEA251", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp5:*:*:*:*:*:*", "matchCriteriaId": "C48458F0-E844-4654-B450-77E2BF97B047", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp6:*:*:*:*:*:*", "matchCriteriaId": "6CA00153-D1EF-44BE-9288-00D2358DA55F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D9B4BC20-945E-4F5E-A850-AE9BC30119F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp1:*:*:*:*:*:*", "matchCriteriaId": "BDE95076-C3FF-41E0-A5A0-B70E779EAF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp2:*:*:*:*:*:*", "matchCriteriaId": "4435E1C4-BAD3-4902-A5F0-3C024CE78766", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp3:*:*:*:*:*:*", "matchCriteriaId": "982A6037-F163-4F48-9CF9-D07D37824565", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp4:*:*:*:*:*:*", "matchCriteriaId": "5FB0CAFB-AA1A-408D-9436-CFDAB6985FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp5:*:*:*:*:*:*", "matchCriteriaId": "848A771F-CB1D-49BC-A1D7-48C31AA91590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp6:*:*:*:*:*:*", "matchCriteriaId": "B976BD9A-CC17-40DD-A167-FB549460AA17", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "84FAC4BC-5A3F-41E6-B881-1ABB00C8167D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:linux:*:*:*:*:*", "matchCriteriaId": "61285CF6-F5BD-4C19-B288-1EF1A9AAFBA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:sparc:*:*:*:*:*", "matchCriteriaId": "ED09307B-02D6-4861-8FF6-5EEC4CE257FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:windows:*:*:*:*:*", "matchCriteriaId": "48DEE6A3-3EED-408A-BC93-85BAB1EA336C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.6:*:x86:*:*:*:*:*", "matchCriteriaId": "1C1A1FDC-6DF3-45CF-A4B7-3847429C6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1F4F13A0-8097-4A06-9989-F33918FE8ADB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "1693ED80-2CE6-4536-A0EA-E7D0C24FDF10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:linux:*:*:*:*:*", "matchCriteriaId": "FDB620CE-A4C0-4A49-8022-DA5FA40FFF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:sparc:*:*:*:*:*", "matchCriteriaId": "4BCF42A1-BAB1-40C8-959F-0AC16B542577", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:windows:*:*:*:*:*", "matchCriteriaId": "82BBA16B-3F2F-49D3-99FC-4F3A45F1B68E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.7:*:x86:*:*:*:*:*", "matchCriteriaId": "A0C6FF56-864E-408C-AFDE-68D6DC7C6880", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el subsistema FTP en Sun Java System Web Proxy Server versiones 4.0 hasta 4.0.7, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n GET de HTTP dise\u00f1ada." } ], "id": "CVE-2008-4541", "lastModified": "2024-11-21T00:51:55.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-10-13T20:00:02.307", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32227" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021038" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31691" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2781" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32227" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-28 21:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "E2C55657-79F3-4447-B827-EE443AB922CD", "versionEndIncluding": "4.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:linux:*:*:*:*:*", "matchCriteriaId": "6270A3A9-B5D1-4234-A3A4-AEF6ACE77932", "versionEndIncluding": "4.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:sparc:*:*:*:*:*", "matchCriteriaId": "D609436F-B0C8-4ACF-82B7-84A73582EE08", "versionEndIncluding": "4.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:windows:*:*:*:*:*", "matchCriteriaId": "5552CC41-2A31-4339-B567-80C0BEDF520A", "versionEndIncluding": "4.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:*:*:x86:*:*:*:*:*", "matchCriteriaId": "EA6A7377-FF15-412A-BF34-C0E47030FE95", "versionEndIncluding": "4.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:aix:*:*:*:*:*", "matchCriteriaId": "845895BA-37A6-49A8-B37D-EC2CFF4B1042", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "BF864FCC-8414-4481-9210-108EA3266FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:sparc:*:*:*:*:*", "matchCriteriaId": "A3A51792-C4A9-4504-98A1-485DB2F480EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:windows:*:*:*:*:*", "matchCriteriaId": "58E16BFC-4A16-429B-A2B4-DB1EB29004F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:aix:*:*:*:*:*", "matchCriteriaId": "E8E7D327-AB45-4DDC-A6B5-4A413B76440F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "5318A317-0981-4A5D-9468-50E08219312B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:linux:*:*:*:*:*", "matchCriteriaId": "A695E901-4FFF-4660-B49E-D7CB139536D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:sparc:*:*:*:*:*", "matchCriteriaId": "24754087-DC84-4B0B-BBDE-70D288AFC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:windows:*:*:*:*:*", "matchCriteriaId": "DCFD3C8D-6E79-4DA6-A600-D952C8E5A151", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:6.1:*:x86:*:*:*:*:*", "matchCriteriaId": "16E496C0-438E-4262-A54B-3CB69C4A88C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:hp_ux:*:*:*:*:*", "matchCriteriaId": "134929FE-2EBA-4B55-904F-111A658160F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:linux:*:*:*:*:*", "matchCriteriaId": "4AB42DB5-10BA-454E-A9F5-A0581BD21FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:sparc:*:*:*:*:*", "matchCriteriaId": "53671389-3822-41CD-ABC9-DC19871579AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:windows:*:*:*:*:*", "matchCriteriaId": "F69C48CB-A038-431D-ABE4-A216E5283266", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_server:7.0:*:x86:*:*:*:*:*", "matchCriteriaId": "6EEB898B-0036-4B7B-B15A-595487D09D72", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funcionalidad View Error Log (Ver Registro de Errores) en Sun Java System Web Proxy Server 4.x anterior a 4.0.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como BugID 6566246." } ], "id": "CVE-2007-6569", "lastModified": "2024-11-21T00:40:28.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-28T21:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/28186" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28216" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/28186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-30 04:00
Modified
2024-11-20 23:50
Severity ?
Summary
Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 | |
sun | java_system_web_proxy_server | 3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "D36EE342-0A55-4F2E-9037-14C0975CEA9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "DD35DA64-83B8-4EF4-94E8-D692E6FDD0AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "BB5D85FB-D4A6-4518-BBD9-8D021446E433", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "A1102A86-8FB6-418E-808E-A6B94016E0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*", "matchCriteriaId": "E6A1EC8B-311D-4D34-A669-FF52B29BB5C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests." } ], "id": "CVE-2004-1350", "lastModified": "2024-11-20T23:50:39.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-30T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13036/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1012005" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security" }, { "source": "cve@mitre.org", "url": "http://www.auscert.org.au/render.html?it=4516" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/964401" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304" }, { "source": "cve@mitre.org", "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11566" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/13036/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1012005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.auscert.org.au/render.html?it=4516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/964401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2004-1350
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/11566 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1012005 | vdb-entry, x_refsource_SECTRACK | |
http://www.pentest.co.uk/documents/ptl-2004-06.html | x_refsource_MISC | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1&searchclause=security | vendor-advisory, x_refsource_SUNALERT | |
http://www.kb.cert.org/vuls/id/964401 | third-party-advisory, x_refsource_CERT-VN | |
http://www.ciac.org/ciac/bulletins/p-027.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
http://www.auscert.org.au/render.html?it=4516 | third-party-advisory, x_refsource_AUSCERT | |
http://www.osvdb.org/displayvuln.php?osvdb_id=11304 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/13036/ | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17920 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:46:12.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11566", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11566" }, { "name": "1012005", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012005" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html" }, { "name": "57606", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security" }, { "name": "VU#964401", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/964401" }, { "name": "P-027", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml" }, { "name": "ESB-2004.0691", "tags": [ "third-party-advisory", "x_refsource_AUSCERT", "x_transferred" ], "url": "http://www.auscert.org.au/render.html?it=4516" }, { "name": "11304", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304" }, { "name": "13036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13036/" }, { "name": "sun-web-proxy-bo(17920)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11566", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11566" }, { "name": "1012005", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012005" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html" }, { "name": "57606", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security" }, { "name": "VU#964401", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/964401" }, { "name": "P-027", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml" }, { "name": "ESB-2004.0691", "tags": [ "third-party-advisory", "x_refsource_AUSCERT" ], "url": "http://www.auscert.org.au/render.html?it=4516" }, { "name": "11304", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304" }, { "name": "13036", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13036/" }, { "name": "sun-web-proxy-bo(17920)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Sun Java System Web Proxy Server (formerly Sun ONE Proxy Server) 3.6 through 3.6 SP4 allow remote attackers to execute arbitrary code via unknown vectors, possibly CONNECT requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11566", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11566" }, { "name": "1012005", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012005" }, { "name": "http://www.pentest.co.uk/documents/ptl-2004-06.html", "refsource": "MISC", "url": "http://www.pentest.co.uk/documents/ptl-2004-06.html" }, { "name": "57606", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1\u0026searchclause=security" }, { "name": "VU#964401", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/964401" }, { "name": "P-027", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-027.shtml" }, { "name": "ESB-2004.0691", "refsource": "AUSCERT", "url": "http://www.auscert.org.au/render.html?it=4516" }, { "name": "11304", "refsource": "OSVDB", "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=11304" }, { "name": "13036", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13036/" }, { "name": "sun-web-proxy-bo(17920)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17920" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1350", "datePublished": "2005-01-19T05:00:00", "dateReserved": "2005-01-06T00:00:00", "dateUpdated": "2024-08-08T00:46:12.342Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4806
Vulnerability from cvelistv5
Published
2006-05-25 10:00
Modified
2024-08-08 00:01
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1014875 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2005/1689 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/16757 | third-party-advisory, x_refsource_SECUNIA | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1014875", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014875" }, { "name": "ADV-2005-1689", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/1689" }, { "name": "16757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16757" }, { "name": "101913", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1014875", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014875" }, { "name": "ADV-2005-1689", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/1689" }, { "name": "16757", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16757" }, { "name": "101913", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Sun Java System Web Proxy Server 3.6 SP7 and earlier allow remote attackers to cause a denial of service (unresponsive service) via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1014875", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014875" }, { "name": "ADV-2005-1689", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/1689" }, { "name": "16757", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16757" }, { "name": "101913", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101913-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4806", "datePublished": "2006-05-25T10:00:00", "dateReserved": "2006-05-25T00:00:00", "dateUpdated": "2024-08-08T00:01:23.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6571
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/26978 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/28216 | third-party-advisory, x_refsource_SECUNIA | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1 | vendor-advisory, x_refsource_SUNALERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43977 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2007/4313 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:06.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "javasystem-proxy-unspecified-xss(43977)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "javasystem-proxy-unspecified-xss(43977)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Proxy Server 3.6 before SP11 on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6611356." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26978", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "javasystem-proxy-unspecified-xss(43977)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43977" }, { "name": "ADV-2007-4313", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4313" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6571", "datePublished": "2007-12-28T21:00:00", "dateReserved": "2007-12-28T00:00:00", "dateUpdated": "2024-08-07T16:11:06.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2881
Vulnerability from cvelistv5
Published
2007-05-29 20:00
Modified
2024-08-07 13:57
Severity ?
EPSS score ?
Summary
Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/1957 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34524 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25405 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/35841 | vdb-entry, x_refsource_OSVDB | |
http://www.kb.cert.org/vuls/id/746889 | third-party-advisory, x_refsource_CERT-VN | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1 | vendor-advisory, x_refsource_SUNALERT | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536 | third-party-advisory, x_refsource_IDEFENSE | |
http://www.securitytracker.com/id?1018130 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/24165 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1957", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1957" }, { "name": "sun-java-web-socks-bo(34524)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524" }, { "name": "25405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25405" }, { "name": "35841", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35841" }, { "name": "VU#746889", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/746889" }, { "name": "102927", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1" }, { "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536" }, { "name": "1018130", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018130" }, { "name": "24165", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24165" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1957", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1957" }, { "name": "sun-java-web-socks-bo(34524)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524" }, { "name": "25405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25405" }, { "name": "35841", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35841" }, { "name": "VU#746889", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/746889" }, { "name": "102927", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1" }, { "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536" }, { "name": "1018130", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018130" }, { "name": "24165", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24165" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1957", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1957" }, { "name": "sun-java-web-socks-bo(34524)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524" }, { "name": "25405", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25405" }, { "name": "35841", "refsource": "OSVDB", "url": "http://osvdb.org/35841" }, { "name": "VU#746889", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/746889" }, { "name": "102927", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1" }, { "name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536" }, { "name": "1018130", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018130" }, { "name": "24165", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24165" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2881", "datePublished": "2007-05-29T20:00:00", "dateReserved": "2007-05-29T00:00:00", "dateUpdated": "2024-08-07T13:57:54.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2597
Vulnerability from cvelistv5
Published
2009-07-27 14:22
Modified
2024-09-17 03:18
Severity ?
EPSS score ?
Summary
The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request.
References
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1 | x_refsource_CONFIRM | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/35979 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1" }, { "name": "258508", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1" }, { "name": "35979", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35979" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-07-27T14:22:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1" }, { "name": "258508", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1" }, { "name": "35979", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35979" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2597", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Sun Java System (SJS) Access Manager Policy Agent module 2.2 for SJS Web Proxy Server 4.0 allows remote attackers to cause a denial of service (daemon crash) via a GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-141248-01-1" }, { "name": "258508", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-258508-1" }, { "name": "35979", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35979" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2597", "datePublished": "2009-07-27T14:22:00Z", "dateReserved": "2009-07-27T00:00:00Z", "dateUpdated": "2024-09-17T03:18:16.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1232
Vulnerability from cvelistv5
Published
2005-04-24 04:00
Modified
2024-08-07 21:44
Severity ?
EPSS score ?
Summary
Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/82356 | vdb-entry, x_refsource_BID | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:05.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "82356", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/82356" }, { "name": "57763", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "82356", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/82356" }, { "name": "57763", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1232", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Sun Java System Web Proxy Server (aka Sun ONE Proxy Server) 3.6 SP6 allows remote attackers to execute arbitrary code via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "82356", "refsource": "BID", "url": "http://www.securityfocus.com/bid/82356" }, { "name": "57763", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57763-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1232", "datePublished": "2005-04-24T04:00:00", "dateReserved": "2005-04-24T00:00:00", "dateUpdated": "2024-08-07T21:44:05.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4541
Vulnerability from cvelistv5
Published
2008-10-13 18:00
Modified
2024-08-07 10:17
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/45782 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/31691 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/32227 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1021038 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/2781 | vdb-entry, x_refsource_VUPEN | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747 | third-party-advisory, x_refsource_IDEFENSE | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1 | vendor-advisory, x_refsource_SUNALERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sun-webproxy-ftp-bo(45782)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782" }, { "name": "31691", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31691" }, { "name": "32227", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32227" }, { "name": "1021038", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021038" }, { "name": "ADV-2008-2781", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2781" }, { "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747" }, { "name": "242986", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sun-webproxy-ftp-bo(45782)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782" }, { "name": "31691", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31691" }, { "name": "32227", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32227" }, { "name": "1021038", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021038" }, { "name": "ADV-2008-2781", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2781" }, { "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747" }, { "name": "242986", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4541", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.7 allows remote attackers to execute arbitrary code via a crafted HTTP GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sun-webproxy-ftp-bo(45782)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45782" }, { "name": "31691", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31691" }, { "name": "32227", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32227" }, { "name": "1021038", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021038" }, { "name": "ADV-2008-2781", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2781" }, { "name": "20081009 Sun Java Web Proxy Server FTP Resource Handling Heap-Based Buffer Overflow", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=747" }, { "name": "242986", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242986-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4541", "datePublished": "2008-10-13T18:00:00", "dateReserved": "2008-10-13T00:00:00", "dateUpdated": "2024-08-07T10:17:09.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3683
Vulnerability from cvelistv5
Published
2008-08-14 20:00
Modified
2024-08-07 09:45
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/44413 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/30671 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2366 | vdb-entry, x_refsource_VUPEN | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/31476 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1020696 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:45:19.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sun-webproxy-ftp-dos(44413)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413" }, { "name": "30671", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30671" }, { "name": "ADV-2008-2366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2366" }, { "name": "240327", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1" }, { "name": "31476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31476" }, { "name": "1020696", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020696" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sun-webproxy-ftp-dos(44413)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413" }, { "name": "30671", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30671" }, { "name": "ADV-2008-2366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2366" }, { "name": "240327", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1" }, { "name": "31476", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31476" }, { "name": "1020696", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020696" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3683", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sun-webproxy-ftp-dos(44413)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44413" }, { "name": "30671", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30671" }, { "name": "ADV-2008-2366", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2366" }, { "name": "240327", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240327-1" }, { "name": "31476", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31476" }, { "name": "1020696", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020696" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3683", "datePublished": "2008-08-14T20:00:00", "dateReserved": "2008-08-14T00:00:00", "dateUpdated": "2024-08-07T09:45:19.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-6276
Vulnerability from cvelistv5
Published
2006-12-04 11:00
Modified
2024-08-07 20:19
Severity ?
EPSS score ?
Summary
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/23186 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1017324 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/4793 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/21371 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1017323 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1017322 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:19:35.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102733", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1" }, { "name": "23186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23186" }, { "name": "1017324", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017324" }, { "name": "sunserver-proxy-csrf(30662)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662" }, { "name": "ADV-2006-4793", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4793" }, { "name": "21371", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21371" }, { "name": "1017323", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017323" }, { "name": "1017322", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017322" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "102733", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1" }, { "name": "23186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23186" }, { "name": "1017324", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017324" }, { "name": "sunserver-proxy-csrf(30662)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662" }, { "name": "ADV-2006-4793", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4793" }, { "name": "21371", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21371" }, { "name": "1017323", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017323" }, { "name": "1017322", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017322" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102733", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1" }, { "name": "23186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23186" }, { "name": "1017324", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017324" }, { "name": "sunserver-proxy-csrf(30662)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30662" }, { "name": "ADV-2006-4793", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4793" }, { "name": "21371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21371" }, { "name": "1017323", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017323" }, { "name": "1017322", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017322" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6276", "datePublished": "2006-12-04T11:00:00", "dateReserved": "2006-12-03T00:00:00", "dateUpdated": "2024-08-07T20:19:35.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6569
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/26978 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/28216 | third-party-advisory, x_refsource_SECUNIA | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/28186 | third-party-advisory, x_refsource_SECUNIA | |
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/4313 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:06.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28186" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-01-04T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28186" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the View Error Log functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566246." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26978", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28186" }, { "name": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view", "refsource": "CONFIRM", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4313" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6569", "datePublished": "2007-12-28T21:00:00", "dateReserved": "2007-12-28T00:00:00", "dateUpdated": "2024-08-07T16:11:06.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6572
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/43978 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/26978 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/28216 | third-party-advisory, x_refsource_SECUNIA | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.vupen.com/english/advisories/2007/4313 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:06.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "javasystem-unspecified-xss(43978)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978" }, { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "javasystem-unspecified-xss(43978)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978" }, { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Sun Java System Web Server 6.1 before SP8 and 7.0 before Update 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566204." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "javasystem-unspecified-xss(43978)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43978" }, { "name": "26978", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "ADV-2007-4313", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4313" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6572", "datePublished": "2007-12-28T21:00:00", "dateReserved": "2007-12-28T00:00:00", "dateUpdated": "2024-08-07T16:11:06.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6570
Vulnerability from cvelistv5
Published
2007-12-28 21:00
Modified
2024-08-07 16:11
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/26978 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/28216 | third-party-advisory, x_refsource_SECUNIA | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/28186 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43976 | vdb-entry, x_refsource_XF | |
http://osvdb.org/40851 | vdb-entry, x_refsource_OSVDB | |
http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247 | x_refsource_CONFIRM | |
http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/4313 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:06.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28186" }, { "name": "javasystem-proxy-viewurl-xss(43976)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976" }, { "name": "40851", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/40851" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26978", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28186" }, { "name": "javasystem-proxy-viewurl-xss(43976)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976" }, { "name": "40851", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/40851" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6570", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the View URL Database functionality in Sun Java System Web Proxy Server 4.x before 4.0.6 and 3.x before 3.6 SP11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka BugID 6566309." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26978", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26978" }, { "name": "28216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28216" }, { "name": "103002", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103002-1" }, { "name": "28186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28186" }, { "name": "javasystem-proxy-viewurl-xss(43976)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43976" }, { "name": "40851", "refsource": "OSVDB", "url": "http://osvdb.org/40851" }, { "name": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247", "refsource": "CONFIRM", "url": "http://docs.sun.com/source/820-3637-10/relnotes36sp11_unix.html#wp19247" }, { "name": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view", "refsource": "CONFIRM", "url": "http://docs.sun.com/app/docs/doc/820-2499/aeaaa?a=view" }, { "name": "ADV-2007-4313", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4313" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6570", "datePublished": "2007-12-28T21:00:00", "dateReserved": "2007-12-28T00:00:00", "dateUpdated": "2024-08-07T16:11:06.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }