Vulnerabilites related to sambar - sambar_server
CVE-2000-0213 (GCVE-0-2000-0213)
Vulnerability from cvelistv5
Published
2000-03-22 05:00
Modified
2024-08-08 05:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1002 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=38B3E60A.6A84FEC3%40cybcom.net | mailing-list, x_refsource_BUGTRAQ | |
http://www.sambar.com/session/highlight?url=/syshelp/history.htm&words=security+&color=red | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:05:54.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1002", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1002" }, { "name": "20000223 Sambar Server alert!", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=38B3E60A.6A84FEC3%40cybcom.net" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1002", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1002" }, { "name": "20000223 Sambar Server alert!", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=38B3E60A.6A84FEC3%40cybcom.net" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1002", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1002" }, { "name": "20000223 Sambar Server alert!", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=38B3E60A.6A84FEC3@cybcom.net" }, { "name": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red", "refsource": "CONFIRM", "url": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0213", "datePublished": "2000-03-22T05:00:00", "dateReserved": "2000-03-22T00:00:00", "dateUpdated": "2024-08-08T05:05:54.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6624 (GCVE-0-2006-6624)
Vulnerability from cvelistv5
Published
2006-12-18 11:00
Modified
2024-08-07 20:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of "./" sequences in the SIZE command.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/23376 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30920 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/5041 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1017393 | vdb-entry, x_refsource_SECTRACK | |
https://www.exploit-db.com/exploits/2934 | exploit, x_refsource_EXPLOIT-DB | |
http://www.securityfocus.com/bid/21617 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:33:59.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "23376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23376" }, { "name": "sambar-size-dos(30920)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php" }, { "name": "ADV-2006-5041", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/5041" }, { "name": "1017393", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017393" }, { "name": "2934", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2934" }, { "name": "21617", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21617" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of \"./\" sequences in the SIZE command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "23376", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23376" }, { "name": "sambar-size-dos(30920)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php" }, { "name": "ADV-2006-5041", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/5041" }, { "name": "1017393", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017393" }, { "name": "2934", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2934" }, { "name": "21617", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21617" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6624", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of \"./\" sequences in the SIZE command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "23376", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23376" }, { "name": "sambar-size-dos(30920)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920" }, { "name": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php", "refsource": "MISC", "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php" }, { "name": "ADV-2006-5041", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/5041" }, { "name": "1017393", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017393" }, { "name": "2934", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2934" }, { "name": "21617", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21617" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6624", "datePublished": "2006-12-18T11:00:00", "dateReserved": "2006-12-17T00:00:00", "dateUpdated": "2024-08-07T20:33:59.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1287 (GCVE-0-2003-1287)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://secunia.com/advisories/9578 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/5781 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1007819 | vdb-entry, x_refsource_SECTRACK | |
http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16059 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:46.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9578" }, { "name": "5781", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5781" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "name": "sambar-post-code-execution(16059)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9578" }, { "name": "5781", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5781" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "name": "sambar-post-code-execution(16059)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16059" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9578" }, { "name": "5781", "refsource": "OSVDB", "url": "http://www.osvdb.org/5781" }, { "name": "1007819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "name": "sambar-post-code-execution(16059)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16059" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1287", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T02:19:46.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1106 (GCVE-0-2001-1106)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 04:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/3095 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/199418 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6909 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:44:07.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3095" }, { "name": "20010725 Sambar Server password decryption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/199418" }, { "name": "sambar-insecure-passwords(6909)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-07-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-22T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3095" }, { "name": "20010725 Sambar Server password decryption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/199418" }, { "name": "sambar-insecure-passwords(6909)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6909" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3095" }, { "name": "20010725 Sambar Server password decryption", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/199418" }, { "name": "sambar-insecure-passwords(6909)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6909" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1106", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T04:44:07.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1010 (GCVE-0-2001-1010)
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in pagecount CGI script in Sambar Server before 5.0 beta 5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) attack on the page parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/3092 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6916 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:37:07.064Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "3092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3092" }, { "name": "sambar-pagecount-overwrite-files(6916)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6916" }, { "name": "20010721 Sambar Web Server pagecount exploit code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in pagecount CGI script in Sambar Server before 5.0 beta 5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) attack on the page parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-06T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "3092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3092" }, { "name": "sambar-pagecount-overwrite-files(6916)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6916" }, { "name": "20010721 Sambar Web Server pagecount exploit code", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in pagecount CGI script in Sambar Server before 5.0 beta 5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) attack on the page parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "3092", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3092" }, { "name": "sambar-pagecount-overwrite-files(6916)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6916" }, { "name": "20010721 Sambar Web Server pagecount exploit code", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1010", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2002-01-31T00:00:00", "dateUpdated": "2024-08-08T04:37:07.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1285 (GCVE-0-2003-1285)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl).
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://www.osvdb.org/5782 | vdb-entry, x_refsource_OSVDB | |
http://www.osvdb.org/5785 | vdb-entry, x_refsource_OSVDB | |
http://www.osvdb.org/5783 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/9578 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/5805 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1007819 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13305 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16056 | vdb-entry, x_refsource_XF | |
http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://www.osvdb.org/5784 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:46.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "5782", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5782" }, { "name": "5785", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5785" }, { "name": "5783", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5783" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9578" }, { "name": "5805", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5805" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "sambar-multiple-xss(16056)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16056" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "5784", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5784" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "5782", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5782" }, { "name": "5785", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5785" }, { "name": "5783", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5783" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9578" }, { "name": "5805", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5805" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "sambar-multiple-xss(16056)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16056" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "5784", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5784" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "5782", "refsource": "OSVDB", "url": "http://www.osvdb.org/5782" }, { "name": "5785", "refsource": "OSVDB", "url": "http://www.osvdb.org/5785" }, { "name": "5783", "refsource": "OSVDB", "url": "http://www.osvdb.org/5783" }, { "name": "9578", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9578" }, { "name": "5805", "refsource": "OSVDB", "url": "http://www.osvdb.org/5805" }, { "name": "1007819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "sambar-multiple-xss(16056)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16056" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "5784", "refsource": "OSVDB", "url": "http://www.osvdb.org/5784" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1285", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T02:19:46.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0835 (GCVE-0-2000-0835)
Vulnerability from cvelistv5
Published
2000-10-18 04:00
Modified
2024-08-08 05:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
search.dll Sambar ISAPI Search utility in Sambar Server 4.4 Beta 3 allows remote attackers to read arbitrary directories by specifying the directory in the query parameter.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1684 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:41.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000915 Sambar Server search CGI vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html" }, { "name": "1684", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1684" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "search.dll Sambar ISAPI Search utility in Sambar Server 4.4 Beta 3 allows remote attackers to read arbitrary directories by specifying the directory in the query parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-01-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000915 Sambar Server search CGI vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html" }, { "name": "1684", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1684" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0835", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "search.dll Sambar ISAPI Search utility in Sambar Server 4.4 Beta 3 allows remote attackers to read arbitrary directories by specifying the directory in the query parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000915 Sambar Server search CGI vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html" }, { "name": "1684", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1684" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0835", "datePublished": "2000-10-18T04:00:00", "dateReserved": "2000-10-15T00:00:00", "dateUpdated": "2024-08-08T05:28:41.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0737 (GCVE-0-2002-0737)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sambar web server before 5.2 beta 1 allows remote attackers to obtain source code of server-side scripts, or cause a denial of service (resource exhaustion) via DOS devices, using a URL that ends with a space and a null character.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html | mailing-list, x_refsource_VULNWATCH | |
http://www.iss.net/security_center/static/8876.php | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/5123 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/4533 | vdb-entry, x_refsource_BID | |
http://online.securityfocus.com/archive/1/268121 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:56:38.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "20020417 [VulnWatch] KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html" }, { "name": "sambar-script-source-disclosure(8876)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8876.php" }, { "name": "5123", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5123" }, { "name": "4533", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4533" }, { "name": "20020417 KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/268121" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Sambar web server before 5.2 beta 1 allows remote attackers to obtain source code of server-side scripts, or cause a denial of service (resource exhaustion) via DOS devices, using a URL that ends with a space and a null character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-07-31T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "20020417 [VulnWatch] KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html" }, { "name": "sambar-script-source-disclosure(8876)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8876.php" }, { "name": "5123", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5123" }, { "name": "4533", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4533" }, { "name": "20020417 KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/268121" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sambar web server before 5.2 beta 1 allows remote attackers to obtain source code of server-side scripts, or cause a denial of service (resource exhaustion) via DOS devices, using a URL that ends with a space and a null character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "20020417 [VulnWatch] KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html" }, { "name": "sambar-script-source-disclosure(8876)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8876.php" }, { "name": "5123", "refsource": "OSVDB", "url": "http://www.osvdb.org/5123" }, { "name": "4533", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4533" }, { "name": "20020417 KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/268121" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0737", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-07-25T00:00:00", "dateUpdated": "2024-08-08T02:56:38.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-1999-1523 (GCVE-0-1999-1523)
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=93901161727373&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/1672 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=93941351229256&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:18:07.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19991004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=93901161727373\u0026w=2" }, { "name": "sambar-logging-bo(1672)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" }, { "name": "19991006 Re: Sample DOS against the Sambar HTTP-Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=93941351229256\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19991004", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=93901161727373\u0026w=2" }, { "name": "sambar-logging-bo(1672)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" }, { "name": "19991006 Re: Sample DOS against the Sambar HTTP-Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=93941351229256\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1523", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19991004", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=93901161727373\u0026w=2" }, { "name": "sambar-logging-bo(1672)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" }, { "name": "19991006 Re: Sample DOS against the Sambar HTTP-Server", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=93941351229256\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1523", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:18:07.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2564 (GCVE-0-2004-2564)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/11748 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/6584 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1010353 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/10444 | vdb-entry, x_refsource_BID | |
http://www.oliverkarow.de/research/sambar.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16286 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/6583 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:14.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11748" }, { "name": "6584", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6584" }, { "name": "1010353", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10444" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-show-showperf-xss(16286)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16286" }, { "name": "6583", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6583" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11748" }, { "name": "6584", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6584" }, { "name": "1010353", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10444" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-show-showperf-xss(16286)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16286" }, { "name": "6583", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6583" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11748", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11748" }, { "name": "6584", "refsource": "OSVDB", "url": "http://www.osvdb.org/6584" }, { "name": "1010353", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10444" }, { "name": "http://www.oliverkarow.de/research/sambar.txt", "refsource": "MISC", "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-show-showperf-xss(16286)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16286" }, { "name": "6583", "refsource": "OSVDB", "url": "http://www.osvdb.org/6583" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2564", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T01:29:14.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1286 (GCVE-0-2003-1286)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HTTP Proxy in Sambar Server before 6.0 beta 6, when security.ini lacks a 127.0.0.1 proxydeny entry, allows remote attackers to send proxy HTTP requests to the Sambar Server's administrative interface and external web servers, by making a "Connection: keep-alive" request before the proxy requests.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/10256 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16054 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/9578 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1007819 | vdb-entry, x_refsource_SECTRACK | |
http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE | |
http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:46.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "10256", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10256" }, { "name": "sambar-http-gain-access(16054)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16054" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "HTTP Proxy in Sambar Server before 6.0 beta 6, when security.ini lacks a 127.0.0.1 proxydeny entry, allows remote attackers to send proxy HTTP requests to the Sambar Server\u0027s administrative interface and external web servers, by making a \"Connection: keep-alive\" request before the proxy requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "10256", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10256" }, { "name": "sambar-http-gain-access(16054)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16054" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1286", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HTTP Proxy in Sambar Server before 6.0 beta 6, when security.ini lacks a 127.0.0.1 proxydeny entry, allows remote attackers to send proxy HTTP requests to the Sambar Server\u0027s administrative interface and external web servers, by making a \"Connection: keep-alive\" request before the proxy requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "10256", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10256" }, { "name": "sambar-http-gain-access(16054)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16054" }, { "name": "9578", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1007819" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "name": "20040430 SECURITY.NNOV: Sambar security quest", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1286", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T02:19:46.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-1999-1178 (GCVE-0-1999-1178)
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/3223 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/9505 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sambar-dump-env(3223)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3223" }, { "name": "19980610 Sambar Server Beta BUG..", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/9505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sambar-dump-env(3223)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3223" }, { "name": "19980610 Sambar Server Beta BUG..", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/9505" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sambar-dump-env(3223)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3223" }, { "name": "19980610 Sambar Server Beta BUG..", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/9505" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1178", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0128 (GCVE-0-2002-0128)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/250545 | mailing-list, x_refsource_BUGTRAQ | |
http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/3885 | vdb-entry, x_refsource_BID | |
http://www.iss.net/security_center/static/7894.php | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:42:27.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "20020116 Sambar Webserver v5.1 DoS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/250545" }, { "name": "20020206 Sambar Webserver Sample Script v5.1 DoS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html" }, { "name": "3885", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3885" }, { "name": "sambar-cgitest-dos(7894)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7894.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-22T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "20020116 Sambar Webserver v5.1 DoS Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/250545" }, { "name": "20020206 Sambar Webserver Sample Script v5.1 DoS Vulnerability Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html" }, { "name": "3885", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3885" }, { "name": "sambar-cgitest-dos(7894)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7894.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "20020116 Sambar Webserver v5.1 DoS Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/250545" }, { "name": "20020206 Sambar Webserver Sample Script v5.1 DoS Vulnerability Exploit", "refsource": "BUGTRAQ", "url": "http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html" }, { "name": "3885", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3885" }, { "name": "sambar-cgitest-dos(7894)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7894.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0128", "datePublished": "2002-06-25T04:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T02:42:27.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1292 (GCVE-0-2001-1292)
Vulnerability from cvelistv5
Published
2002-05-03 04:00
Modified
2024-08-08 04:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/6973.php | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:51:08.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sambar-telnet-bo(6973)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/6973.php" }, { "name": "20010813 Sambar Telnet Proxy/Server multiple vulnerablietis", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-05-09T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sambar-telnet-bo(6973)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/6973.php" }, { "name": "20010813 Sambar Telnet Proxy/Server multiple vulnerablietis", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sambar-telnet-bo(6973)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/6973.php" }, { "name": "20010813 Sambar Telnet Proxy/Server multiple vulnerablietis", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1292", "datePublished": "2002-05-03T04:00:00", "dateReserved": "2002-05-01T00:00:00", "dateUpdated": "2024-08-08T04:51:08.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3506 (GCVE-0-2005-3506)
Vulnerability from cvelistv5
Published
2005-11-05 11:00
Modified
2024-08-07 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in proxy.asp in Sambar Server 6.3 BETA 2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the (1) Remote Proxy Server or (2) Proxy Filter IPs field.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/17329 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/20434 | vdb-entry, x_refsource_OSVDB | |
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html | mailing-list, x_refsource_FULLDISC | |
http://www.vupen.com/english/advisories/2005/2272 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:17:22.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "17329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17329" }, { "name": "20434", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/20434" }, { "name": "20051102 H4CREW-000002 Sambars 6.3 BETA 2 Proxy.asp XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html" }, { "name": "ADV-2005-2272", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in proxy.asp in Sambar Server 6.3 BETA 2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the (1) Remote Proxy Server or (2) Proxy Filter IPs field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "17329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17329" }, { "name": "20434", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/20434" }, { "name": "20051102 H4CREW-000002 Sambars 6.3 BETA 2 Proxy.asp XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html" }, { "name": "ADV-2005-2272", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2272" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in proxy.asp in Sambar Server 6.3 BETA 2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the (1) Remote Proxy Server or (2) Proxy Filter IPs field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "17329", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17329" }, { "name": "20434", "refsource": "OSVDB", "url": "http://www.osvdb.org/20434" }, { "name": "20051102 H4CREW-000002 Sambars 6.3 BETA 2 Proxy.asp XSS", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html" }, { "name": "ADV-2005-2272", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2272" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3506", "datePublished": "2005-11-05T11:00:00", "dateReserved": "2005-11-05T00:00:00", "dateUpdated": "2024-08-07T23:17:22.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2086 (GCVE-0-2004-2086)
Vulnerability from cvelistv5
Published
2005-05-19 04:00
Modified
2024-08-08 01:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15071 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/5786 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1008979 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/9607 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/82/353087 | mailing-list, x_refsource_VULN-DEV |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "sambar-http-post-bo(15071)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15071" }, { "name": "5786", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5786" }, { "name": "1008979", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1008979" }, { "name": "9607", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9607" }, { "name": "20040207 Sambar 6.0 stack overflow", "tags": [ "mailing-list", "x_refsource_VULN-DEV", "x_transferred" ], "url": "http://www.securityfocus.com/archive/82/353087" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "sambar-http-post-bo(15071)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15071" }, { "name": "5786", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5786" }, { "name": "1008979", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1008979" }, { "name": "9607", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9607" }, { "name": "20040207 Sambar 6.0 stack overflow", "tags": [ "mailing-list", "x_refsource_VULN-DEV" ], "url": "http://www.securityfocus.com/archive/82/353087" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "sambar-http-post-bo(15071)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15071" }, { "name": "5786", "refsource": "OSVDB", "url": "http://www.osvdb.org/5786" }, { "name": "1008979", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1008979" }, { "name": "9607", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9607" }, { "name": "20040207 Sambar 6.0 stack overflow", "refsource": "VULN-DEV", "url": "http://www.securityfocus.com/archive/82/353087" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2086", "datePublished": "2005-05-19T04:00:00", "dateReserved": "2005-05-19T00:00:00", "dateUpdated": "2024-08-08T01:15:01.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1284 (GCVE-0-2003-1284)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 02:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sambar Server before 6.0 beta 6 allows remote attackers to obtain sensitive information via direct requests to the default scripts (1) environ.pl and (2) testcgi.exe.
References
▼ | URL | Tags |
---|---|---|
http://www.sambar.com/security.htm | x_refsource_CONFIRM | |
http://secunia.com/advisories/9578 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1007819 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13305 | vdb-entry, x_refsource_XF | |
http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:19:46.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Sambar Server before 6.0 beta 6 allows remote attackers to obtain sensitive information via direct requests to the default scripts (1) environ.pl and (2) testcgi.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sambar Server before 6.0 beta 6 allows remote attackers to obtain sensitive information via direct requests to the default scripts (1) environ.pl and (2) testcgi.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.sambar.com/security.htm", "refsource": "CONFIRM", "url": "http://www.sambar.com/security.htm" }, { "name": "9578", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9578" }, { "name": "1007819", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1007819" }, { "name": "sambar-multiple-vulnerabilities(13305)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "name": "20030925 Sambar Server Multiple Vulnerabilities", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1284", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T02:19:46.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2000-0509 (GCVE-0-2000-0509)
Vulnerability from cvelistv5
Published
2000-07-12 04:00
Modified
2024-08-08 05:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/1287 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=95990103207665&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:21:30.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1287", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1287" }, { "name": "20000601 DST2K0008: Buffer Overrun in Sambar Server 4.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=95990103207665\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1287", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1287" }, { "name": "20000601 DST2K0008: Buffer Overrun in Sambar Server 4.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=95990103207665\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0509", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1287", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1287" }, { "name": "20000601 DST2K0008: Buffer Overrun in Sambar Server 4.3", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=95990103207665\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0509", "datePublished": "2000-07-12T04:00:00", "dateReserved": "2000-07-11T00:00:00", "dateUpdated": "2024-08-08T05:21:30.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2565 (GCVE-0-2004-2565)
Vulnerability from cvelistv5
Published
2005-11-22 02:00
Modified
2024-08-08 01:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a "..\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/11748 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1010353 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/10444 | vdb-entry, x_refsource_BID | |
http://www.oliverkarow.de/research/sambar.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16287 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/6585 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:14.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11748" }, { "name": "1010353", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10444" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-multiple-directory-traversal(16287)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16287" }, { "name": "6585", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a \"..\\\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11748", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11748" }, { "name": "1010353", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10444" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-multiple-directory-traversal(16287)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16287" }, { "name": "6585", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6585" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a \"..\\\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11748", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11748" }, { "name": "1010353", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010353" }, { "name": "10444", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10444" }, { "name": "http://www.oliverkarow.de/research/sambar.txt", "refsource": "MISC", "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "name": "sambar-multiple-directory-traversal(16287)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16287" }, { "name": "6585", "refsource": "OSVDB", "url": "http://www.osvdb.org/6585" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2565", "datePublished": "2005-11-22T02:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-08T01:29:14.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:6.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "EA79C728-17F1-4557-A9C9-7A2D7DC00FF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in show.asp and (2) the title parameter in showperf.asp." } ], "id": "CVE-2004-2564", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11748" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1010353" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6583" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6584" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10444" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1010353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16286" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a "..\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 6.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:6.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "EA79C728-17F1-4557-A9C9-7A2D7DC00FF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a \"..\\\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp." } ], "id": "CVE-2004-2565", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11748" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1010353" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6585" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10444" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/11748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1010353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.oliverkarow.de/research/sambar.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.osvdb.org/6585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/10444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16287" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-02-06 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "671A5D3C-F894-416F-8D59-0AAFFEDB1514", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "DF4DD306-A8E6-457C-8586-2D2199057E49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in results.stm for Sambar Server before the 6.0 production release allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP POST request with a long query parameter." } ], "id": "CVE-2004-2086", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-02-06T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1008979" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.osvdb.org/5786" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/82/353087" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9607" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://securitytracker.com/id?1008979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.osvdb.org/5786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/82/353087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15071" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-11-14 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
search.dll Sambar ISAPI Search utility in Sambar Server 4.4 Beta 3 allows remote attackers to read arbitrary directories by specifying the directory in the query parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 4.3 | |
sambar | sambar_server | 4.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "94F70201-3D0E-463A-82B8-4CDE086EAF61", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:4.4:beta3:*:*:*:*:*:*", "matchCriteriaId": "2147F86B-2293-4D20-B5FC-58F5DA936D7D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "search.dll Sambar ISAPI Search utility in Sambar Server 4.4 Beta 3 allows remote attackers to read arbitrary directories by specifying the directory in the query parameter." } ], "id": "CVE-2000-0835", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-11-14T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-09/0175.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1684" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Sambar Server before 6.0 beta 6 allows remote attackers to obtain sensitive information via direct requests to the default scripts (1) environ.pl and (2) testcgi.exe.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.2 | |
sambar | sambar_server | 5.3 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "79D8D4CB-F8D3-4DDC-A1B7-A94B4356F534", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7A771154-443C-4468-A205-6D0CA83866C9", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "86F8BCFE-EA52-4FB0-AEBE-7B943D756A6B", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "783E72D8-31A7-4C9F-94C7-B3132C870B1F", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "5A22FCF4-BB10-4F4C-BA8F-0859A938BE7A", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "D268C142-F115-4CBD-9317-6DC5349162C6", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "AE45D3C7-0C27-4E6F-BEEE-9FCF06A2E893", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:*", "matchCriteriaId": "3A3D357F-182C-4ADD-A641-34D8631324A2", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD7C9867-0988-4453-81D9-13397569ED1D", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7FDF4BEF-1E53-42DF-8AE4-3A86381C74D4", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F646589A-7811-408F-B911-EFBD2AE05077", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "533995E6-A3D9-4339-9590-3EA14FF0A23C", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "DF4DD306-A8E6-457C-8586-2D2199057E49", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "FA499468-4633-45BF-9477-0448934B09D1", "vulnerable": false }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "05EEE59B-977E-4692-B8D8-D45A4E1D1123", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sambar Server before 6.0 beta 6 allows remote attackers to obtain sensitive information via direct requests to the default scripts (1) environ.pl and (2) testcgi.exe." } ], "id": "CVE-2003-1284", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-08-13 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.2 | |
sambar | sambar_server | 5.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "79D8D4CB-F8D3-4DDC-A1B7-A94B4356F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:site2:*:*:*:*:*:*", "matchCriteriaId": "7D55CE5A-87D6-4D44-9314-C840F00B4EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:site3:*:*:*:*:*:*", "matchCriteriaId": "32095930-CBE4-490C-A26F-5FA6EEBF62BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "E72C0D4A-1A9A-4D41-B0A2-6519B5BD53B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:beta3:*:*:*:*:*:*", "matchCriteriaId": "449D64EE-59A4-491B-8208-45AAEF010C94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sambar Telnet Proxy/Server allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long password." } ], "id": "CVE-2001-1292", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-08-13T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/6973.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0160.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/6973.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-08-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Sambar web server before 5.2 beta 1 allows remote attackers to obtain source code of server-side scripts, or cause a denial of service (resource exhaustion) via DOS devices, using a URL that ends with a space and a null character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sambar web server before 5.2 beta 1 allows remote attackers to obtain source code of server-side scripts, or cause a denial of service (resource exhaustion) via DOS devices, using a URL that ends with a space and a null character." }, { "lang": "es", "value": "El servidor web Sambar anterior a la versi\u00f3n 5.2 beta 1 permite a atacantes remotos obtener c\u00f3digo fuente de los scrips de servidor, o provocar una denegaci\u00f3n de servicio por medio de dispositivos DOS, usando una URL que acaba con un espaci\u00f3 y un caracter nulo." } ], "id": "CVE-2002-0737", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-08-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/268121" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8876.php" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5123" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/268121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8876.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4533" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | * | |
sambar | sambar_server | 4.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "83D8ABA8-038A-48E2-B2E4-796BDF2E2BAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D9F5F4F3-A2EC-4F9E-BB96-16F43666F792", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request." } ], "id": "CVE-1999-1523", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-10-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=93901161727373\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=93941351229256\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=93901161727373\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=93941351229256\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1672" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-05 11:02
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in proxy.asp in Sambar Server 6.3 BETA 2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the (1) Remote Proxy Server or (2) Proxy Filter IPs field.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/17329 | Third Party Advisory | |
cve@mitre.org | http://www.osvdb.org/20434 | Broken Link | |
cve@mitre.org | http://www.vupen.com/english/advisories/2005/2272 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17329 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/20434 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2005/2272 | Permissions Required, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | * | |
sambar | sambar_server | 6.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAA9B0B8-AAE7-4DC0-9F7D-9BFF57270B93", "versionEndIncluding": "6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.3:beta2:*:*:*:*:*:*", "matchCriteriaId": "5BB556EC-7C3D-4E4A-B4CF-D238A2CE80D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in proxy.asp in Sambar Server 6.3 BETA 2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the (1) Remote Proxy Server or (2) Proxy Filter IPs field." } ], "id": "CVE-2005-3506", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-05T11:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17329" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/20434" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/2272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/17329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/20434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2005/2272" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-06-01 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:*:beta9:*:*:*:*:*:*", "matchCriteriaId": "D06A6D8D-2B28-42F7-84B4-887329A5219B", "versionEndIncluding": "4.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflows in the finger and whois demonstration scripts in Sambar Server 4.3 allow remote attackers to execute arbitrary commands via a long hostname." } ], "id": "CVE-2000-0509", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-06-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=95990103207665\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=95990103207665\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1287" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-03-25 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cgitest.exe in Sambar Server 5.1 before Beta 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long argument." }, { "lang": "es", "value": "El fichero cgitest.exe de Sambar Server 5.1 anterioresa Beta 4, permite a atacantes remotos provocar fallos de denegaci\u00f3n de servicio (DoS)y la posible ejecuci\u00f3n de c\u00f3digo arbitrario mediante un par\u00e1metro largo." } ], "id": "CVE-2002-0128", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/7894.php" }, { "source": "cve@mitre.org", "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/250545" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.der-keiler.de/Mailing-Lists/securityfocus/bugtraq/2002-02/0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/7894.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/250545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3885" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.2 | |
sambar | sambar_server | 5.3 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "79D8D4CB-F8D3-4DDC-A1B7-A94B4356F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7A771154-443C-4468-A205-6D0CA83866C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "86F8BCFE-EA52-4FB0-AEBE-7B943D756A6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "783E72D8-31A7-4C9F-94C7-B3132C870B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "5A22FCF4-BB10-4F4C-BA8F-0859A938BE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "D268C142-F115-4CBD-9317-6DC5349162C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "AE45D3C7-0C27-4E6F-BEEE-9FCF06A2E893", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:*", "matchCriteriaId": "3A3D357F-182C-4ADD-A641-34D8631324A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD7C9867-0988-4453-81D9-13397569ED1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7FDF4BEF-1E53-42DF-8AE4-3A86381C74D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F646589A-7811-408F-B911-EFBD2AE05077", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "533995E6-A3D9-4339-9590-3EA14FF0A23C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device." } ], "id": "CVE-2003-1287", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/5781" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/5781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16059" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-06-10 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:4.1:beta:*:*:*:*:*:*", "matchCriteriaId": "AC67D71C-1FBE-452B-BB91-EF29AB699CEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script." } ], "id": "CVE-1999-1178", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-06-10T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/9505" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/9505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/3223" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-18 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of "./" sequences in the SIZE command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 6.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "C3917867-994A-4F60-9792-262C66E07982", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FTP Server in Sambar Server 6.4 allows remote authenticated users to cause a denial of service (application crash) via a long series of \"./\" sequences in the SIZE command." }, { "lang": "es", "value": "El servidor FTP en el Sambar Server 6.4 permite a atacantes remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) mediante una serie larga de secuencias de \"./\" en el comando SIZE." } ], "id": "CVE-2006-6624", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-18T11:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/23376" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1017393" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/21617" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/5041" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/23376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/21617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/21617.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/5041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2934" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in pagecount CGI script in Sambar Server before 5.0 beta 5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) attack on the page parameter.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html | Vendor Advisory | |
cve@mitre.org | http://www.sambar.com/security.htm | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/3092 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/6916 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.sambar.com/security.htm | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/3092 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/6916 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 4.4 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9681C75D-45B3-46AB-8FEA-5D8E45D81AF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in pagecount CGI script in Sambar Server before 5.0 beta 5 allows remote attackers to overwrite arbitrary files via a .. (dot dot) attack on the page parameter." } ], "id": "CVE-2001-1010", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-07-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3092" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-07/0565.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6916" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-25 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 4.1 | |
sambar | sambar_server | 4.2.1_production | |
sambar | sambar_server | 4.3 | |
sambar | sambar_server | 4.4 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1300381D-449D-42BE-8B94-28D2A5ACC3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:4.2.1_production:*:*:*:*:*:*:*", "matchCriteriaId": "F2FC3057-9969-48B5-A5CF-C11912B89D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "94F70201-3D0E-463A-82B8-4CDE086EAF61", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "9681C75D-45B3-46AB-8FEA-5D8E45D81AF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7A771154-443C-4468-A205-6D0CA83866C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default configuration of Sambar Server 5 and earlier uses a symmetric key that is compiled into the binary program for encrypting passwords, which could allow local users to break all user passwords by cracking the key or modifying a copy of the sambar program to call the decryption procedure." } ], "id": "CVE-2001-1106", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-07-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/199418" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3095" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/199418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6909" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.2 | |
sambar | sambar_server | 5.3 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "79D8D4CB-F8D3-4DDC-A1B7-A94B4356F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7A771154-443C-4468-A205-6D0CA83866C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "86F8BCFE-EA52-4FB0-AEBE-7B943D756A6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "783E72D8-31A7-4C9F-94C7-B3132C870B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "5A22FCF4-BB10-4F4C-BA8F-0859A938BE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "D268C142-F115-4CBD-9317-6DC5349162C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "AE45D3C7-0C27-4E6F-BEEE-9FCF06A2E893", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:*", "matchCriteriaId": "3A3D357F-182C-4ADD-A641-34D8631324A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD7C9867-0988-4453-81D9-13397569ED1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7FDF4BEF-1E53-42DF-8AE4-3A86381C74D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F646589A-7811-408F-B911-EFBD2AE05077", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "533995E6-A3D9-4339-9590-3EA14FF0A23C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "DF4DD306-A8E6-457C-8586-2D2199057E49", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "FA499468-4633-45BF-9477-0448934B09D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "05EEE59B-977E-4692-B8D8-D45A4E1D1123", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Sambar Server before 6.0 beta 6 allow remote attackers to inject arbitrary web script or HTML via the query string to (1) isapi/testisa.dll, (2) testcgi.exe, (3) environ.pl, (4) the query parameter to samples/search.dll, (5) the price parameter to mortgage.pl, (6) the query string in dumpenv.pl, (7) the query string to dumpenv.pl, and (8) the E-Mail field of the guestbook script (book.pl)." } ], "id": "CVE-2003-1285", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/9578" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5782" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5783" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5784" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5785" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5805" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/9578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.osvdb.org/5805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16056" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
HTTP Proxy in Sambar Server before 6.0 beta 6, when security.ini lacks a 127.0.0.1 proxydeny entry, allows remote attackers to send proxy HTTP requests to the Sambar Server's administrative interface and external web servers, by making a "Connection: keep-alive" request before the proxy requests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.0 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.1 | |
sambar | sambar_server | 5.2 | |
sambar | sambar_server | 5.3 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 | |
sambar | sambar_server | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "79D8D4CB-F8D3-4DDC-A1B7-A94B4356F534", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "8CDD4A6F-A334-4081-B7DC-ED4DA5F635E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "B1DA41E4-5170-4BDD-9BFC-8146CCE3EF9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "387DA782-35E3-47CB-B041-DAD3C433CF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "F8B1D7C8-E0D4-4FB1-9011-8BD361B38CC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7A771154-443C-4468-A205-6D0CA83866C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "86F8BCFE-EA52-4FB0-AEBE-7B943D756A6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A167B292-3A6A-4C8D-BABD-7ACAD9D7149C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "783E72D8-31A7-4C9F-94C7-B3132C870B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "5A22FCF4-BB10-4F4C-BA8F-0859A938BE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:*", "matchCriteriaId": "D268C142-F115-4CBD-9317-6DC5349162C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:*", "matchCriteriaId": "AE45D3C7-0C27-4E6F-BEEE-9FCF06A2E893", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:*", "matchCriteriaId": "3A3D357F-182C-4ADD-A641-34D8631324A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD7C9867-0988-4453-81D9-13397569ED1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7FDF4BEF-1E53-42DF-8AE4-3A86381C74D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "F646589A-7811-408F-B911-EFBD2AE05077", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "533995E6-A3D9-4339-9590-3EA14FF0A23C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "DF4DD306-A8E6-457C-8586-2D2199057E49", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "FA499468-4633-45BF-9477-0448934B09D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sambar:sambar_server:6.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "05EEE59B-977E-4692-B8D8-D45A4E1D1123", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HTTP Proxy in Sambar Server before 6.0 beta 6, when security.ini lacks a 127.0.0.1 proxydeny entry, allows remote attackers to send proxy HTTP requests to the Sambar Server\u0027s administrative interface and external web servers, by making a \"Connection: keep-alive\" request before the proxy requests." } ], "id": "CVE-2003-1286", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/10256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/9578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1007819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=103\u0026type=vulnerabilities\u0026flashstatus=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/security.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/10256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16054" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-02-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sambar | sambar_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sambar:sambar_server:*:beta7:*:*:*:*:*:*", "matchCriteriaId": "1C1C9F1B-2D13-4C36-9DBB-675A309BF526", "versionEndIncluding": "4.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters." } ], "id": "CVE-2000-0213", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-02-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1002" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=38B3E60A.6A84FEC3%40cybcom.net" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.sambar.com/session/highlight?url=/syshelp/history.htm\u0026words=security+\u0026color=red" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=38B3E60A.6A84FEC3%40cybcom.net" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }