5 results (0.010 seconds)

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

Apcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an Arbitrary Command Execution issue in apcupsd_status.php. Apcupsd versión 0.3.91_5, como de costumbre en pfSense hasta versión 2.4.4-RELEASE-p3 y otros productos, tiene un problema de ejecución de comandos arbitrarios en el archivo apcupsd_status.ph • https://ctrsec.io/index.php/2019/05/28/cve-2019-12584-12585-command-injection-vulnerability-on-pfsense-2-4-4-release-p3 https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3 https://redmine.pfsense.org/issues/9556 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 0

Apcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an XSS issue in apcupsd_status.php. Apcupsd versión 0.3.91_5, como es usado en pfSense hasta versión 2.4.4-RELEASE-p3 y otros productos, tiene un problema de tipo Cross-Site Scripting (XSS) en el archivo apcupsd_status.php. • https://ctrsec.io/index.php/2019/05/28/cve-2019-12584-12585-command-injection-vulnerability-on-pfsense-2-4-4-release-p3 https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3 https://redmine.pfsense.org/issues/9556 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server. Vulnerabilidad desconocida en apcupsd anteriores a 3.8.6, y 3.10.x anteriores a 3.10.5 permite a atacantes remotos ganar privilegios de root, posiblemente mediante cadenas de formato en una petición a un servidor esclavo. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-015.0.txt http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/apcupsd/apcupsd/src/apcnisd.c.diff?r1=1.5&r2=1.6 http://hsj.shadowpenguin.org/misc/apcupsd_exp.txt http://securitytracker.com/id?1006108 http://sourceforge.net/project/shownotes.php?release_id=137900 http://www.debian.org/security/2003/dsa-277 http://www.iss.net/security_center/static/11334.php http://www.mandriva.com/security/advisories?name=MDKSA-2003:018 h •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in apcupsd before 3.8.6, and 3.10.x before 3.10.5, may allow attackers to cause a denial of service or execute arbitrary code, related to usage of the vsprintf function. Múltiples desbordamientos de búfer en apcupsd anteriores a 3.10.5 pueden permitir a atacantes causar una denegación de servicio o ejecutar código arbitrario, relacionado con el uso de la función vsprintf. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-015.0.txt http://securitytracker.com/id?1006108 http://sourceforge.net/project/shownotes.php?release_id=137892 http://sourceforge.net/project/shownotes.php?release_id=137900 http://www.debian.org/security/2003/dsa-277 http://www.iss.net/security_center/static/11491.php http://www.mandriva.com/security/advisories?name=MDKSA-2003:018 http://www.novell.com/linux/security/advisories/2003_022_apcupsd.html http://www.securityfocus.c •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 2

APC UPS daemon, apcupsd, saves its process ID in a world-writable file, which allows local users to kill an arbitrary process by specifying the target process ID in the apcupsd.pid file. • https://www.exploit-db.com/exploits/251 http://archives.neohapsis.com/archives/bugtraq/2000-12/0066.html http://www.linux-mandrake.com/en/security/MDKSA-2000-077.php3 http://www.securityfocus.com/bid/2070 https://exchange.xforce.ibmcloud.com/vulnerabilities/5654 •