3 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 5

Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/. FuguHub version 8.1 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/51550 https://github.com/rio128128/CVE-2023-24078 https://github.com/overgrowncarrot1/CVE-2023-24078 https://github.com/ag-rodriguez/CVE-2023-24078 http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html https://github.com/ojan2021/Fuguhub-8.1-RCE • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

Insecure Service File Permissions in the bd service in Real Time Logic BarracudaDrive v6.5 allow local attackers to escalate privileges to admin by replacing the %SYSTEMDRIVE%\bd\bd.exe file. When the computer next starts, the new bd.exe will be run as LocalSystem. Los Permisos de Archivos de Servicio No Seguro en el servicio bd en Real Time Logic BarracudaDrive versión v6.5, permiten a atacantes locales escalar privilegios a administrador mediante el reemplazo del archivo %SYSTEMDRIVE%\bd\bd.exe. Cuando la computadora se inicie la próxima vez, el nuevo bd.exe será ejecutado como LocalSystem • https://github.com/boku7/BarracudaDrivev6.5-LocalPrivEsc https://www.exploit-db.com/exploits/48789 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) role parameter to roles.lsp, (2) name parameter to user.lsp, (3) path parameter to wizard/setuser.lsp, (4) host parameter to tunnelconstr.lsp, or (5) newpath parameter to wfsconstr.lsp in rtl/protected/admin/. Múltiples vulnerabilidades de XSS en BarracudaDrive anterior a 6.7.2 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del (1) parámetro role hacia roles.lsp, (2) parámetro name hacia user.lsp, (3) parámetro path hacia wizard/setuser.lsp, (4) parámetro host hacia tunnelconstr.lsp o (5) parámetro newpath hacia wfsconstr.lsp en rtl/protected/admin/. • http://secpod.org/advisories/SecPod_Advistory_BarracudaDrive_6.7.1_Mult_XSS_Vuln.txt http://secpod.org/blog/?p=2309 http://secunia.com/advisories/58309 http://www.securityfocus.com/bid/67138 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •