CVE-2008-1049
https://notcve.org/view.php?id=CVE-2008-1049
Unspecified vulnerability in Parallels SiteStudio before 1.7.2, and 1.8.x before 1.8b, as used in Parallels H-Sphere 3.0 before Patch 9 and 2.5 before Patch 11, has unknown impact and attack vectors. Vulnerabilidad no especificada en Parallels SiteStudio en versiones anteriores a 1.7.2, y 1.8.x en versiones anteriores 1.8b, como lo utilizado en Parallels H-Sphere 3.0 en versiones anteriores a Patch 9 y 2.5 en versiones anteriores a Patch 11, tiene un efecto y vectores de ataque desconocidos. • http://secunia.com/advisories/29084 http://www.psoft.net/misc/hs_ss_technical_update.html http://www.securityfocus.com/bid/28002 http://www.securitytracker.com/id?1019506 https://exchange.xforce.ibmcloud.com/vulnerabilities/40846 •
CVE-2006-6382
https://notcve.org/view.php?id=CVE-2006-6382
The control panel for Positive Software H-Sphere before 2.5.0 RC3 creates log files in a user's directory with insecure permissions, which allows local users to append log data to arbitrary files via a symlink attack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. El panel de control para Positive Software H-Sphere versiones anteriores a 2.5.0 RC3 crea ficheros de log en directorio de usuario con permisos no seguros, que permite a usuarios locales añadir datos de log a ficheros de su elección mediante ataque de enlaces simbólicos. NOTA: El origen de esta información es desconocido. Los detalles se han obtenido exclusivamente de información de terceros. • http://secunia.com/advisories/23199 http://www.securityfocus.com/bid/21436 https://exchange.xforce.ibmcloud.com/vulnerabilities/30753 •
CVE-2006-3278
https://notcve.org/view.php?id=CVE-2006-3278
Cross-site scripting (XSS) vulnerability in H-Sphere 2.5.1 Beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) next_template, (2) start, (3) curr_menu_id, and (4) arid parameters in psoft/servlet/resadmin/psoft.hsphere.CP when using the mailman/massmail.html template_name. Vulnerabilidad de secuencias de comandos en H-Sphere v2.5.1 Beta v1 y anteriores permiten a atacantes remotos inyectar código web o HTML de su elección a través de los parámetros (1) next_template, (2) start, (3) curr_menu_id, y (4) arid en psoft/servlet/resadmin/psoft.hsphere.CP cuando es usado mailman/massmail.html template_name. • http://pridels0.blogspot.com/2006/06/h-sphere-25x-xss-vuln.html http://secunia.com/advisories/20798 http://www.osvdb.org/26863 http://www.securityfocus.com/bid/18677 http://www.vupen.com/english/advisories/2006/2550 https://exchange.xforce.ibmcloud.com/vulnerabilities/27381 •
CVE-2006-0193
https://notcve.org/view.php?id=CVE-2006-0193
Cross-site scripting (XSS) vulnerability in the Hosting Control Panel (psoft.hsphere.CP) in Positive Software H-Sphere 2.4.3 Patch 8 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter in a login action. • http://secunia.com/advisories/18447 http://www.osvdb.org/22372 http://www.psoft.net/HSdocumentation/versions/?v=all&p=r http://www.psoft.net/HSdocumentation/versions/index.php?v=243p9&p=r http://www.securityfocus.com/archive/1/421704/100/0/threaded http://www.vupen.com/english/advisories/2006/0172 https://exchange.xforce.ibmcloud.com/vulnerabilities/24096 •
CVE-2003-1247 – H-Sphere WebShell 2.4 - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2003-1247
Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist. • https://www.exploit-db.com/exploits/22128 https://www.exploit-db.com/exploits/22129 http://psoft.net/misc/webshell_patch.html http://secunia.com/advisories/7832 http://www.iss.net/security_center/static/10999.php http://www.iss.net/security_center/static/11002.php http://www.iss.net/security_center/static/11003.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6527 http://www.securityfocus.com/bid/6537 http://www.securityfocus.co •