Page 2 of 13 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 4

A DOM based XSS in GFI Kerio Control v9.3.0 allows embedding of malicious code and manipulating the login page to send back a victim's cleartext credentials to an attacker via a login/?reason=failure&NTLM= URI. Una vulnerabilidad de tipo XSS basado en DOM en GFI Kerio Control versión v9.3.0, permite insertar código malicioso y manipular la página de inicio de sesión para enviar de vuelta las credenciales de la víctima en texto sin cifrar para un atacante por medio de un inicio de un URI sesión/?reason=failure&NTLM=. GFI Kerio Control firewall version 9.3.0 suffers from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/154678/GFI-Kerio-Control-9.3.0-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2019/Sep/35 https://twitter.com/haxel0rd/status/1174279811751174144 https://www.youtube.com/watch?v=ZqqR89vzZ_I • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

Kerio Connect 8.0.0 through 9.2.2, and Kerio Connect Client desktop application for Windows and Mac 9.2.0 through 9.2.2, when e-mail preview is enabled, allows remote attackers to conduct clickjacking attacks via a crafted e-mail message. Kerio Connect 8.0.0 a 9.2.2 y la aplicación de escritorio Kerio Connect Client para Windows y Mac 9.2.0 a 9.2.2, cuando la vista previa de correo electrónico está habilitada, permite a atacantes remotos realizar ataques de clickjacking a través de un mensaje de correo electrónico. • https://www.gfi.com/support/products/Clickjacking-vulnerability-in-Kerio-Connect-8-and-9-CVE-2017-7440 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Untrusted search path vulnerability in GFI Backup 3.1 Build 20100730 2009 Home Edition allows local users to gain privileges via a Trojan horse ArmAccess.dll file in the current working directory, as demonstrated by a directory that contains a .gbc or .gbt file. NOTE: some of these details are obtained from third party information. Vulnerabilidad de ruta de búsqueda no confiable en GFI Backup v3.1 Build 20100730 2009 Home Edition, permite a usuarios locales ganar privilegios a través de un archivo de caballo de troya ArmAccess.dll en el directorio de trabajo actual, como se demostró con un directorio que contiene un archivo .gbc o .gbt. NOTA: algunos de estos detalles han sido obtenidos de fuentes de terceros. • http://secunia.com/advisories/41226 http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list •

CVSS: 6.2EPSS: 0%CPEs: 2EXPL: 0

Race condition in VIPRE Antivirus Premium 4.0.3272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ** EN DISPUTA ** Condición de carrera en VIPRE Antivirus Premium v4.0.3272 sobre Windows XP permite a usuarios locales evitar manejadores de kernel-mode hook, y ejecutar código malicioso que podría ser bloquedo por un manejador pero no por un detector de malware signature-based, a través de ciertos cambios en memoria user-space durante la ejecución de hook-handler , también conocido por argument-switch attack o ataque KHOBE. Nota: este problema está en disputa por terceras partes. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://www.f-secure.com/weblog/archives/00001949.html http://www.osvdb.org/67660 http://www.securit • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 0

Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html http://kbase.gfi.com/showarticle.asp?id=KBID002451 http://marc.info/?l=bugtraq&m=112914475508191&w=2 http://secunia.com/advisories/17136 http://securityreason.com/securityalert/74 http://securitytracker.com/id?1015046 http://www.osvdb.org/19926 http://www.securityfocus.com/bid/15081 •