Page 2 of 9 results (0.001 seconds)

CVSS: 9.8EPSS: 97%CPEs: 1EXPL: 3

Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control. Sonatype Nexus Repository Manager, en versiones anteriores a la 3.15.0, tiene un control de acceso incorrecto. Sonatype Nexus Repository Manager before 3.15.0 has an incorrect access control vulnerability. Exploitation allows for remote code execution. • https://github.com/mpgn/CVE-2019-7238 https://github.com/jas502n/CVE-2019-7238 https://github.com/smallpiggy/CVE-2019-7238 https://support.sonatype.com/hc/en-us/articles/360017310793-CVE-2019-7238-Nexus-Repository-Manager-3-Missing-Access-Controls-and-Remote-Code-Execution-February-5th-2019 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Sonatype Nexus OSS and Pro before 2.11.1-01 allows remote attackers to read or write to arbitrary files via unspecified vectors. Vulnerabilidad de salto de directorio en Sonatype Nexus OSS y Pro anterior a 2.11.1-01 permite a atacantes remotos leer o escribir en ficheros arbitrarios a través de vectores no especificados. • http://secunia.com/advisories/61134 http://www.sonatype.org/advisories/archive/2014-12-23-Nexus https://support.sonatype.com/entries/84705937-CVE-2014-9389-Nexus-Security-Advisory-Directory-Traversal • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 19EXPL: 0

Unspecified vulnerability in Sonatype Nexus OSS and Pro 2.4.0 through 2.7.1 allows attackers to create arbitrary user accounts via unknown vectors related to "an unauthenticated execution path." Vulnerabilidad no especificada en Sonatype Nexus OSS y Pro 2.4.0 hasta 2.7.1 permite a atacantes crear cuentas de usuarios arbitrarios a través de vectores desconocidos relacionados con una ruta de ejecución no autenticada. • http://secunia.com/advisories/57142 http://www.osvdb.org/104049 http://www.securityfocus.com/bid/65956 http://www.sonatype.org/advisories/archive/2014-03-03-Nexus https://support.sonatype.com/entries/42374566-CVE-2014-2034-Nexus-Security-Advisory-REST-API •

CVSS: 7.5EPSS: 3%CPEs: 25EXPL: 0

Sonatype Nexus 1.x and 2.x before 2.7.1 allows remote attackers to create arbitrary objects and execute arbitrary code via unspecified vectors related to unmarshalling of unintended Object types. Sonatype Nexus 1.x y 2.x anteriores a 2.7.1 permite a atacantes remotos crear objetos de forma arbitraria y ejecutar código a través de vectores no especificados relacionados con la resolución de referencias de tipo de Objeto a los que no se debería • http://www.sonatype.org/advisories/archive/2014-01-13-Nexus https://sonatype.zendesk.com/entries/37551958-Configuring-Xstream-Whitelist https://support.sonatype.com/entries/37828023-Nexus-Security-Vulnerability • CWE-94: Improper Control of Generation of Code ('Code Injection') •