8 results (0.007 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Insufficient Cross-Site Request Forgery (XSRF) protection on Expedition Migration Tool allows remote unauthenticated attackers to hijack the authentication of administrators and to perform actions on the Expedition Migration Tool. This issue affects Expedition Migration Tool 1.1.51 and earlier versions. Una protección de Cross-Site Request Forgery (XSRF) insuficiente en Expedition Migration Tool, permite a atacantes remotos no autenticados secuestrar la autenticación de los administradores y ejecutar acciones en Expedition Migration Tool. Este problema afecta a Expedition Migration Tool versión 1.1.51 y anteriores. • https://security.paloaltonetworks.com/CVE-2020-1977 https://www.tenable.com/security/research/tra-2020-11 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition Migration tool 1.1.12 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the Devices View. Palo Alto Networks Expedition Migration Tool, en las versiones 1.1.12 y anteriores, es vulnerable a un XSS que podría permitir a un atacante no autenticado ejecutar JavaScript o HTML arbitrario en Devices View. • http://www.securityfocus.com/bid/107900 https://security.paloaltonetworks.com/CVE-2019-1574 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

The Expedition Migration tool 1.1.6 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the User Mapping Settings. La herramienta Migration de Expedition versión 1.1.6 y anteriores, pueden permitir que un atacante autenticado ejecute de manera arbitraria JavaScript o HTML en la configuración de asignación de usuarios. • https://security.paloaltonetworks.com/CVE-2019-1567 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the RADIUS server settings. La herramienta Expedition Migration, en versiones 1.1.8 y anteriores, podría permitir que un atacante autenticado ejecute JavaScript o HTML arbitrarios en las opciones del servidor RADIUS. • http://www.securityfocus.com/bid/107564 https://securityadvisories.paloaltonetworks.com/Home/Detail/142 https://www.tenable.com/security/research/tra-2019-13 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the LDAP server settings. La herramienta Expedition Migration, en versiones 1.1.8 y anteriores, podría permitir que un atacante autenticado ejecute JavaScript o HTML arbitrarios en las opciones del servidor LDAP. • http://www.securityfocus.com/bid/107564 https://securityadvisories.paloaltonetworks.com/Home/Detail/142 https://www.tenable.com/security/research/tra-2019-13 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •