Page 2 of 9 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 32EXPL: 0

Cross-site scripting (XSS) vulnerability in the Hosting Control Panel (psoft.hsphere.CP) in Positive Software H-Sphere 2.4.3 Patch 8 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter in a login action. • http://secunia.com/advisories/18447 http://www.osvdb.org/22372 http://www.psoft.net/HSdocumentation/versions/?v=all&p=r http://www.psoft.net/HSdocumentation/versions/index.php?v=243p9&p=r http://www.securityfocus.com/archive/1/421704/100/0/threaded http://www.vupen.com/english/advisories/2006/0172 https://exchange.xforce.ibmcloud.com/vulnerabilities/24096 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 3

H-Sphere Winbox 2.4.2 and 2.4.3 RC1 stores sensitive information such as username and password in plaintext in world-readable log files, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/25636 http://exploitlabs.com/files/advisories/EXPL-A-2005-007-hsphere.txt http://secunia.com/advisories/15287 http://www.osvdb.org/16239 http://www.psoft.net/misc/hsphere_winbox_security_update_passwd.html http://www.securityfocus.com/bid/13559 https://exchange.xforce.ibmcloud.com/vulnerabilities/20522 •

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 3

Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist. • https://www.exploit-db.com/exploits/22128 https://www.exploit-db.com/exploits/22129 http://psoft.net/misc/webshell_patch.html http://secunia.com/advisories/7832 http://www.iss.net/security_center/static/10999.php http://www.iss.net/security_center/static/11002.php http://www.iss.net/security_center/static/11003.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6527 http://www.securityfocus.com/bid/6537 http://www.securityfocus.co •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

H-Sphere WebShell 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) mode and (2) zipfile parameters in a URL request. • http://psoft.net/misc/webshell_patch.html http://www.iss.net/security_center/static/11001.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6537 http://www.securityfocus.com/bid/6539 http://www.securitytracker.com/id?1005893 •