4D WebSTAR 5.2.2

CPE Details

4D WebSTAR 5.2.2
5.2.2
2024-02-16 13:36 +00:00
2024-02-16 13:36 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*

Informations

Vendor

4d

Product

webstar

Version

5.2.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2005-3143 2005-10-05 02:00 +00:00 Unspecified vulnerability in the Mailbox Server for 4D WebStar before 5.3.5 allows attackers to cause a denial of service (crash) via IMAP clients on Mac OS X 10.4 Mail 2.
5
CVE-2004-0695 2004-07-16 02:00 +00:00 Stack-based buffer overflow in the FTP service for 4D WebSTAR 5.3.2 and earlier allows remote attackers to execute arbitrary code via a long FTP command.
7.5
CVE-2004-0696 2004-07-16 02:00 +00:00 The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a "*" (asterisk) character.
5
CVE-2004-0697 2004-07-16 02:00 +00:00 Unknown vulnerability in 4D WebSTAR 5.3.2 and earlier allows remote attackers to read the php.ini configuration file and possibly obtain sensitive information.
5
CVE-2004-0698 2004-07-16 02:00 +00:00 4D WebSTAR 5.3.2 and earlier allows local users to read and modify arbitrary files via a symlink attack.
3.6
CVE-2004-0079 2004-03-18 04:00 +00:00 The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
7.5
HIGH
CVE-2004-0081 2004-03-18 04:00 +00:00 OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
5
CVE-2004-0112 2004-03-18 04:00 +00:00 The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
5
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.