Page 2 of 7 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Amazon AWS module before 7.x-1.3 for Drupal uses the base URL and AWS access key to generate the access token, which makes it easier for remote attackers to guess the token value and create backups via a crafted URL. El módulo Amazon AWS anterior a 7.x-1.3 para Drupal utiliza la URL de base y la clave de acceso a AWS para generar el token de acceso, lo que facilita a atacantes remotos adivinar el valor del token y crear copias de seguridad a través de una URL manipulada. • http://cgit.drupalcode.org/aws_amazon/commit/?id=9377a26 http://www.openwall.com/lists/oss-security/2015/01/29/6 http://www.securityfocus.com/bid/74277 https://www.drupal.org/node/2415457 https://www.drupal.org/node/2415873 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 14%CPEs: 1EXPL: 2

Directory traversal vulnerability in AWS XMS 2.5 allows remote attackers to view arbitrary files via the 'what' parameter. Una vulnerabilidad de salto de directorio en AWS XMS versión 2.5, permite a atacantes remotos visualizar archivos arbitrarios por medio del parámetro "what". AWS XMS version 2.5 suffers from a path traversal vulnerability. • https://www.exploit-db.com/exploits/24906 http://www.exploit-db.com/exploits/24906 http://www.securityfocus.com/bid/58753 https://exchange.xforce.ibmcloud.com/vulnerabilities/83062 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •