6 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

22 Oct 2024 — Multiple Stored Cross-Site Scripting vulnerabilities were discovered in Y Soft SAFEQ 6 Build 53. Multiple fields in the YSoft SafeQ web application can be used to inject malicious inputs that, due to a lack of output sanitization, result in the execution of arbitrary JS code. These fields can be leveraged to perform XSS attacks on legitimate users accessing the SafeQ web interface. • https://github.com/mbadanoiu/CVE-2022-23861 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 1

22 Oct 2024 — A Local Privilege Escalation issue was discovered in Y Soft SAFEQ 6 Build 53. The SafeQ JMX service running on port 9696 is vulnerable to JMX MLet attacks. Because the service did not enforce authentication and was running under the "NT Authority\System" user, an attacker is able to use the vulnerability to execute arbitrary code and elevate to the system user. • https://github.com/mbadanoiu/CVE-2022-23862 • CWE-306: Missing Authentication for Critical Function •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

13 Jul 2023 — An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration. ** EN DISPUTA ** Se descubrió un problema en YSoft SAFEQ 6 S... • https://www.ysoft.com/en/legal/ldaps-encryption-downgrade-attack-vulnerability • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

06 Sep 2022 — An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859. Se ha detectado un problema en YSoft SAFEQ 6 versiones anteriores a 6.0.72. Fueron configurados privilegios incorrectos como parte del paquete de instalación de los servicios del Cliente V3, permitien... • https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Jul 2021 — Incorrect privileges in the MU55 FlexiSpooler service in YSoft SafeQ 6 6.0.55 allows local user privilege escalation by overwriting the executable file via an alternative data stream. Unos privilegios incorrectos en el servicio MU55 FlexiSpooler en YSoft SafeQ versión 6 6.0.55, permite una escalada de privilegios de usuario local al sobreescribir el archivo ejecutable por medio de un flujo de datos alternativo • https://www.ysoft.com/en • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

19 Mar 2019 — YSoft SafeQ Server 6 allows a replay attack. YSoft SafeQ Server 6 permite un ataque de reproducción. • https://herolab.usd.de/wp-content/uploads/sites/4/usd20180021.txt • CWE-294: Authentication Bypass by Capture-replay •