Page 2 of 22 results (0.013 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

03 Jul 2018 — ModSecurity 3.0.0 has XSS via an onerror attribute of an IMG element. NOTE: a third party has disputed this issue because it may only apply to environments without a Core Rule Set configured ** EN DISPUTA ** ModSecurity 3.0.0 tiene Cross-Site Scripting (XSS) mediante un atributo onerror de un elemento IMG. NOTA: un tercero ha discutido sobre este problema porque puede que solo aplique a entornos que no tengan configurados Core Rule Set. ModSecurity version 3.0.0 suffers from a cross site scripting vulnerabi... • https://packetstorm.news/files/id/148414 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 21%CPEs: 1EXPL: 3

31 Dec 2017 — Trustwave Secure Web Gateway (SWG) through 11.8.0.27 allows remote attackers to append an arbitrary public key to the device's SSH Authorized Keys data, and consequently obtain remote root access, via the publicKey parameter to the /sendKey URI. Trustwave Secure Web Gateway (SWG) hasta la versión 11.8.0.27 permite que los atacantes remotos anexen una clave pública arbitraria a los datos de claves SSH autorizadas del dispositivo y obtener acceso root remoto en consecuencia mediante el parámetro publicKey al ... • https://www.exploit-db.com/exploits/44047 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

15 Apr 2014 — apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header. apache2/modsecurity.c en ModSecurity anterior a 2.7.6 permite a atacantes remotos evadir reglas mediante el uso de codificación de transferencia fragmentada con un valor convertido a mayúsculas fragmentado en la cabecera HTTP Transfer-Encoding. Martin Holst Swende discovered a flaw in the way chunked requests are han... • http://martin.swende.se/blog/HTTPChunked.html •

CVSS: 7.5EPSS: 8%CPEs: 5EXPL: 3

29 May 2013 — The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header. El módulo ModSecurity anterior a 2.7.4 para Apache HTTP Server, permite a atacantes remotos provocar una denegación de servicio (deferencia a puntero NULO, caída de proceso y consumo de disco) a través de una petición POST con un cuerpo (body) de gran tamaño y... • https://packetstorm.news/files/id/121815 • CWE-476: NULL Pointer Dereference •

CVSS: 9.1EPSS: 4%CPEs: 9EXPL: 0

25 Apr 2013 — ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability. ModSecurity antes de v2.7.3 permite a atacantes remotos leer archivos arbitrarios, enviar peticiones HTTP a los servidores de la intranet, o causar una denegación de servicio (consumo de CPU y memoria) a través d... • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101898.html • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 9.1EPSS: 13%CPEs: 5EXPL: 2

28 Dec 2012 — The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data. El módulo mod_security2 antes de v2.7.0 para el Servidor HTTP Apache permite a atacantes remotos evitar las reglas y entregar datos POST de su elección a una aplicación PHP, a través de una solicitud multipart en la que una parte no válida precede a los datos elaborados. • https://www.exploit-db.com/exploits/37949 •

CVSS: 6.1EPSS: 1%CPEs: 4EXPL: 0

22 Jul 2012 — ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header. ModSecurity v2.5.11 trata los valores de los parámetros de solicitud que contienen comillas simples como archivos, permite a atacantes remotos eludir las regl... • http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 3%CPEs: 7EXPL: 0

22 Jul 2012 — ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031. ModSecurity anterior a v2.6.6, cuando se utiliza con PHP, no maneja correctam... • http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

05 May 2011 — Trustwave WebDefend Enterprise before 5.0 7.01.903-1.4 stores specific user-account credentials in a MySQL database, which makes it easier for remote attackers to read the event collection table via requests to the management port, a different vulnerability than CVE-2011-0756. Trustwave WebDefend Enterprise anteriores a v5.07.01.903-1.4 almacena credenciales específicas de cuentas de usuario en una base de datos MySQL, lo que hace que sea más fácil para los atacantes remotos leer la tabla de recopilación de... • http://securitytracker.com/id?1025447 • CWE-255: Credentials Management Errors •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

05 May 2011 — The application server in Trustwave WebDefend Enterprise before 5.0 uses hardcoded console credentials, which makes it easier for remote attackers to read security-event data by using the remote console GUI to connect to the management port. El servidor de aplicaciones de Trustwave WebDefend Enterprise en versiones anteriores a la 5.0 utiliza credenciales de consola escritas en código, lo que facilita a atacantes remotos leer datos de eventos de seguridad usando la GUI de consola remoto para conectarse al p... • http://securitytracker.com/id?1025447 • CWE-255: Credentials Management Errors •