Page 2 of 42 results (0.004 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

Accellion FTA 9_12_370 and earlier is affected by OS command execution via a crafted POST request to various admin endpoints. The fixed version is FTA_9_12_380 and later. Accellion versiones FTA 9_12_370 y anteriores, está afectada por una ejecución de comandos del Sistema Operativo por medio de una petición POST diseñada para varios endpoints de administración. La versión corregida es FTA_9_12_380 y posteriores Accellion FTA contains an OS command injection vulnerability exploited via a crafted POST request to various admin endpoints. • https://github.com/accellion/CVEs/blob/main/CVE-2021-27104.txt https://www.accellion.com/products/fta • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later. Accellion versiones FTA 9_12_411 y anteriores, están afectadas por una vulnerabilidad de tipo SSRF por medio de una petición POST diseñada para el archivo wmProgressstat.html. La versión corregida es FTA_9_12_416 y posteriores Accellion FTA contains a server-side request forgery (SSRF) vulnerability exploited via a crafted POST request to wmProgressstat.html. • https://github.com/accellion/CVEs/blob/main/CVE-2021-27103.txt https://www.accellion.com/products/fta • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. Accellion versiones FTA 9_12_411 y anteriores, está afectada por una ejecución de comandos del Sistema Operativo por medio de una llamada de servicio web local. La versión corregida es FTA_9_12_416 y posteriores Accellion FTA contains an OS command injection vulnerability exploited via a local web service call. • https://github.com/accellion/CVEs/blob/main/CVE-2021-27102.txt https://www.accellion.com/products/fta • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later. Accellion versiones FTA 9_12_370 y anteriores, están afectadas por una inyección SQL por medio de un encabezado de Host diseñado en una petición al archivo document_root.html. La versión corregida es FTA_9_12_380 y posteriores Accellion FTA contains a SQL injection vulnerability exploited via a crafted host header in a request to document_root.html. • https://github.com/accellion/CVEs/blob/main/CVE-2021-27101.txt https://www.accellion.com/products/fta •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'). Accellion File Transfer Appliance versión FTA_8_0_540, sufre una instancia CWE-77: Neutralización Inapropiada de Elementos Especiales usados en un Comando ("Command Injection"). • https://www.rapid7.com/db/modules/exploit/linux/misc/accellion_fta_mpipe2 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •