4 results (0.012 seconds)

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

RSA NetWitness Platform versions prior to 11.1.0.2 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote authenticated malicious RSA NetWitness Server user with an Admin or Operator role could exploit this vulnerability to execute arbitrary commands on the server with root privileges. RSA NetWitness Platform en versiones anteriores a la 11.1.0.2 y RSA Security Analytics en versiones anteriores a la 10.6.6 son vulnerables a una vulnerabilidad de inyección de plantillas debido a una configuración insegura del motor de plantillas empleado en el producto. Un usuario remoto autenticado malicioso de RSA NetWitness Server con rol de Admin u Operator podría explotar esta vulnerabilidad para ejecutar comandos arbitrarios en el servidor con privilegios root. • http://seclists.org/fulldisclosure/2018/Aug/32 http://www.securityfocus.com/bid/105134 http://www.securitytracker.com/id/1041541 http://www.securitytracker.com/id/1041542 •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

EMC RSA Security Analytics 10.5.3 and 10.6.2 contains fixes for a Reflected Cross-Site Scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system. EMC RSA Security Analytics 10.5.3 y 10.6.2 contienen correcciones para una vulnerabilidad Reflected Cross-Site Scripting que podría ser potencialmente explotada por usuarios maliciosos para comprometer al sistema afectado. • http://www.securityfocus.com/archive/1/540032/30/0/threaded http://www.securityfocus.com/bid/95718 http://www.securitytracker.com/id/1037666 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

EMC RSA NetWitness before 9.8.5.19 and RSA Security Analytics before 10.2.4 and 10.3.x before 10.3.2, when Kerberos PAM is enabled, do not require a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid account name. EMC RSA NetWitness anterior a 9.8.5.19 y RSA Security Analytics anterior a 10.2.4 y 10.3.x anterior a 10.3.2, cuando Kerberos PAM está habilitado, no requieren una contraseña, lo que permiten a atacantes remotos evadir autenticación mediante el aprovechamiento de conocimiento de un nombre de cuenta válido. • http://archives.neohapsis.com/archives/bugtraq/2014-05/0052.html • CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

EMC RSA Security Analytics (SA) 10.x before 10.3, and RSA NetWitness NextGen 9.8, does not ensure that SA Core requests originate from the SA REST UI, which allows remote attackers to bypass intended access restrictions by sending a Core request from a web browser or other unintended user agent. EMC RSA Security Analytics (SA) 10.x anterior a 10.3, y RSA NetWitness NextGen 9.8, no asegura que las peticiones al SA Core se originen en el SA REST UI, lo que permite a atacantes remotos evitar las restricciones de acceso al enviar una solicitud Core desde una web navegador u otro agente de usuario no deseado. • http://archives.neohapsis.com/archives/bugtraq/2013-12/0034.html http://www.securitytracker.com/id/1029446 • CWE-264: Permissions, Privileges, and Access Controls •