5 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password. • https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads https://zuso.ai/Advisory • CWE-287: Improper Authentication CWE-1393: Use of Default Password •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors. • https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads https://zuso.ai/Advisory • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors. • https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads https://zuso.ai/Advisory • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

CSRF in the Agent/Center component of CyberPower PowerPanel Business Edition 3.4.0 allows an attacker to submit POST requests to any forms in the web application. This can be exploited by tricking an authenticated user into visiting an attacker controlled web page. Un problema de tipo CSRF en el componente Agente/Center de PowerPanel Business Edition versión 3.4.0 de CyberPower, permite que un atacante envíe peticiones POST hacia cualquier formulario en la aplicación web. Esto puede ser explotado mediante el engaño a un usuario identificado para que visite una página web controlada por un atacante. • http://packetstormsecurity.com/files/153581/PowerPanel-Business-Edition-3.4.0-Cross-Site-Request-Forgery.html http://seclists.org/fulldisclosure/2019/Jul/11 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A stored XSS vulnerability in the Agent/Center component of CyberPower PowerPanel Business Edition 3.4.0 allows a privileged attacker to embed malicious JavaScript in the SNMP trap receivers form. Upon visiting the /agent/action_recipient Event Action/Recipient page, the embedded code will be executed in the browser of the victim. Una vulnerabilidad de tipo XSS almacenado en el componente Agent/Center de PowerPanel Business Edition versión 3.4.0 de CyberPower, permite a un atacante privilegiado insertar JavaScript malicioso en los formularios receptores de captura SNMP. Al visitar la página Action/Recipient del evento /agent/action_recipient, el código incorporado podría ser ejecutado en el navegador de la víctima. • https://www.cyberpowersystems.com/category/advisory-notices https://www.exploit-db.com/exploits/47059 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •