Page 2 of 16 results (0.010 seconds)

CVSS: 6.1EPSS: 0%CPEs: 10EXPL: 1

An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). The WebToLeadCapture functionality is found vulnerable to unauthenticated cross-site scripting (XSS) attacks. This attack vector is mitigated by proper validating the redirect URL values being passed along. Existe un problema en SugarCRM en versiones anteriores a la 7.7.2.3, en versiones 7.8.x anteriores a la 7.8.2.2 y en versiones 7.9.x anteriores a la 7.9.2.0 (y Sugar Community Edition 6.5.26). La funcionalidad WebToLeadCapture es vulnerable a ataques Cross-Site Scripting (XSS) no autenticados. • https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-008 https://www.synology.com/support/security/Synology_SA_17_53_SugarCRM • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 10EXPL: 1

An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits. • https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-006 https://www.synology.com/support/security/Synology_SA_17_53_SugarCRM • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 92%CPEs: 1EXPL: 2

SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code. SugarCRM CE versiones anteriores a 6.3.1 incluyéndola, contiene scripts que usan la función "unserialize()" con entrada controlada por el usuario lo que permite a atacantes remotos ejecutar código PHP arbitrario. SugarCRM CE versions 6.3.1 and below suffer from an unserialize() PHP code execution vulnerability. • https://www.exploit-db.com/exploits/19403 https://www.exploit-db.com/exploits/19381 https://seclists.org/bugtraq/2012/Jun/165 https://security-tracker.debian.org/tracker/CVE-2012-0694 • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 73%CPEs: 63EXPL: 2

SugarCRM before 6.1.3 does not properly handle reloads and direct requests for a warning page produced by a certain duplicate check, which allows remote authenticated users to discover (1) the names of customers via a ShowDuplicates action to the Accounts module, reachable through index.php; or (2) the names of contact persons via a ShowDuplicates action to the Contacts module, reachable through index.php. SugarCRM en versiones anteriores a la 6.1.3 no maneja apropiadamente las recargas y peticiones directas de una página de advertencia producida por una comprobación de duplicidad ("check duplicate") determinada, lo que permite a usuarios autenticados remotos averiguar (1) los nombres de clientes a través una acción ShowDuplicates del módulo Accounts, a la que se puede acceder través de index.php; o (2) los nombres de personas de contacto a través de una acción ShowDuplicates del módulo Contacts, a la que se puede acceder través de index.php. SugarCRM versions 6.1.1 and below suffer from a list privilege restriction bypass vulnerability. • https://www.exploit-db.com/exploits/35467 http://securityreason.com/securityalert/8141 http://www.redteam-pentesting.de/advisories/rt-sa-2011-002 http://www.securityfocus.com/archive/1/517027/100/0/threaded http://www.securityfocus.com/bid/46885 http://www.securitytracker.com/id?1025222 http://www.vupen.com/english/advisories/2011/0675 https://exchange.xforce.ibmcloud.com/vulnerabilities/66110 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 36EXPL: 0

SQL injection vulnerability in SugarCRM 4.5.1o and earlier, 5.0.0k and earlier, and 5.2.0g and earlier, allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en SugarCRM v4.5.1o y anteriores, v5.0.0k y anteriores, y v5.2.0g y anteriores, permite a los atacantes remotos ejecutar arbitrariamente comandos SQL a través de vectores no especificados. • http://jvn.jp/en/jp/JVN31035930/index.html http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000056.html http://secunia.com/advisories/36423 http://www.ipa.go.jp/security/vuln/documents/2009/200908_sugarcrm.html http://www.securityfocus.com/bid/36118 http://www.sugarcrm.com/forums/showthread.php?t=50907 http://www.sugarcrm.com/forums/showthread.php?t=50953 https://exchange.xforce.ibmcloud.com/vulnerabilities/52679 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •