Page 2 of 16 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

08 Dec 2021 — An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to ... • http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html • CWE-330: Use of Insufficiently Random Values •

CVSS: 9.8EPSS: 83%CPEs: 1EXPL: 1

08 Dec 2021 — An issue was discovered in Reprise RLM 14.2. Because /goform/change_password_process does not verify authentication or authorization, an unauthenticated user can change the password of any existing user. This allows an attacker to change the password of any known user, thereby preventing valid users from accessing the system and granting the attacker full access to that user's account. Se ha detectado un problema en Reprise RLM versión 14.2. Debido a que /goform/change_password_process no verifica la autent... • http://packetstormsecurity.com/files/165186/Reprise-License-Manager-14.2-Unauthenticated-Password-Change.html • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

08 Dec 2021 — An issue was discovered in /goform/login_process in Reprise RLM 14.2. When an attacker attempts to login, the response if a username is valid includes Login Failed, but does not include this string if the username is invalid. This allows an attacker to enumerate valid users. Se ha detectado un problema en /goform/login_process en Reprise RLM versión 14.2. Cuando un atacante intenta iniciar sesión, la respuesta si un nombre de usuario es válido incluye Login Failed, pero no incluye esta cadena si el nombre d... • http://packetstormsecurity.com/files/165182/Reprise-License-Manager-14.2-User-Enumeration.html • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

20 Aug 2018 — An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf parameter. By default, the web interface is on port 5054, and does not require authentication. NOTE: the vendor has stated "We do not consider this a vulnerability. ** EN DISPUTA ** Se ha descubierto un problema en Reprise Lic... • http://seclists.org/fulldisclosure/2021/Dec/18 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

20 Aug 2018 — An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated "We do not consider this a vulnerability." ** EN DISPUTA ** Se ha descubierto un problema en el editor de licencias en Reprise License Manager (RLM) hasta la versión 12.2.BL2. Es una vulnerabilidad Cross-Site Scripting (XSS) en el parámetro If en /goform/edit_lf_get_data mediante GE... • https://bittherapy.net/rce-with-arbitrary-file-write-and-xss-in-reprise-license-manager • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

21 Feb 2018 — An issue was discovered in Reprise License Manager 11.0. This vulnerability is a Path Traversal where the attacker, by changing a field in the Web Request, can have access to files on the File System of the Server. By specifying a pathname in the POST parameter "lf" to the goform/edit_lf_get_data URI, the attacker can retrieve the content of a file. Se ha descubierto un problema en Reprise License Manager 11.0. La vulnerabilidad es un salto de directorio en el que el atacante, al cambiar un campo en la peti... • http://www.0x90.zone/web/path-traversal/2018/02/16/Path-Traversal-Reprise-LM.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •