Page 2 of 8 results (0.000 seconds)

CVSS: 4.3EPSS: 0%CPEs: 10EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Adobe RoboHelp 8 and 9 for Word allow remote attackers to inject arbitrary web script or HTML via a crafted URL, related to certain .htm files in (1) template_stock and (2) template_csh directories. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Adobe RoboHelp v8 y v9 para Word, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una URL modificada, relacionado con ciertos archivos .htm en los directorios (1) template_stock y (2) template_csh • http://osvdb.org/79251 http://secunia.com/advisories/47936 http://www.adobe.com/support/security/bulletins/apsb12-04.html http://www.securityfocus.com/bid/52008 http://www.securitytracker.com/id?1026676 https://exchange.xforce.ibmcloud.com/vulnerabilities/73179 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in Adobe RoboHelp 8 and 9 before 9.0.1.262, and RoboHelp Server 8 and 9, allows remote attackers to inject arbitrary web script or HTML via the URI, related to template_stock/whutils.js. Vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Adobe RoboHelp 8 y 9 anterior a v9.0.1.262, y RoboHelp Server 8 and 9 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de URI, relacionado con template_stock/whutils.js Adobe RoboHelp version 9.0 suffers from a cross site scripting vulnerability. Versions 9.0.1.232 and below are affected. • http://securityreason.com/securityalert/8334 http://www.adobe.com/support/security/bulletins/apsb11-23.html http://www.us-cert.gov/cas/techalerts/TA11-222A.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 1

Cross-site scripting (XSS) vulnerability in Adobe RoboHelp X5, 6, and Server 6 allows remote attackers to inject arbitrary web script or HTML via a URL after a # (hash) in the URL path, as demonstrated using en/frameset-7.html, and possibly other unspecified vectors involving templates and (1) whstart.js and (2) whcsh_home.htm in WebHelp, (3) wf_startpage.js and (4) wf_startqs.htm in FlashHelp, or (5) WindowManager.dll in RoboHelp Server 6. Una vulnerabilidad de tipo cross-site-scripting (XSS) en Adobe RoboHelp versiones X5, 6 y Server versión 6 permite a los atacantes remotos inyectar scripts web o HTML arbitrarios por medio de una dirección URL después de un valor de dirección URL en la ruta de url, como se ha demostrado utilizando en/frameset-7.html, y posiblemente otros vectores no especificados con plantillas y (1) whstart.js y (2) whcsh_home.htm en WebHelp, (3) wf_startpage.js y (4) wf_startqs.htm en FlashHelp o (5) la biblioteca WindowManager.dll en RoboHelp Server versión 6. • https://www.exploit-db.com/exploits/30016 http://osvdb.org/35867 http://secunia.com/advisories/25211 http://www.adobe.com/support/security/bulletins/apsb07-10.html http://www.devtarget.org/adobe-advisory-05-2007.txt http://www.securityfocus.com/archive/1/468360/100/0/threaded http://www.securityfocus.com/bid/23878 http://www.securitytracker.com/id?1018020 http://www.vupen.com/english/advisories/2007/1714 https://exchange.xforce.ibmcloud.com/vulnerabilities/34181 •