Page 3 of 15 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

An issue was discovered in Arcserve Unified Data Protection (UDP) through 6.5 Update 4. There is a DDI-VRT-2018-20 Unauthenticated Sensitive Information Disclosure via /UDPUpdates/Config/FullUpdateSettings.xml issue. Se ha descubierto un problema en Arcserve Unified Data Protection (UDP) hasta la versión 6.5 Update 4. Hay una divulgación de información sensible no autenticada en DDI-VRT-2018-20 mediante /UDPUpdates/Config/FullUpdateSettings.xml. • https://support.arcserve.com/s/article/360001392563?language=en_US https://support.arcserve.com/s/article/Security-vulnerabilities-with-Arcserve-UDP-and-fixes-for-them?language=en_US https://www.digitaldefense.com/blog/zero-day-alerts/arcserve-disclosure • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 0

An issue was discovered in Arcserve Unified Data Protection (UDP) through 6.5 Update 4. There is a DDI-VRT-2018-21 Reflected Cross-site Scripting via /authenticationendpoint/domain.jsp issue. Se ha descubierto un problema en Arcserve Unified Data Protection (UDP) hasta la versión 6.5 Update 4. Hay Cross-Site Scripting (XSS) reflejado en DDI-VRT-2018-21 mediante /authenticationendpoint/domain.jsp. • https://support.arcserve.com/s/article/360001392563?language=en_US https://support.arcserve.com/s/article/Security-vulnerabilities-with-Arcserve-UDP-and-fixes-for-them?language=en_US https://www.digitaldefense.com/blog/zero-day-alerts/arcserve-disclosure • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.4EPSS: 80%CPEs: 1EXPL: 0

Directory traversal vulnerability in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive information or cause a denial of service via a crafted file path to the (1) reportFileServlet or (2) exportServlet servlet. Vulnerabilidad de salto de directorio en Arcserve UDP anterior a 5.0 Update 4 permite a atacantes remotos obtener información sensible o causar una denegación de servicio a través de una ruta de fichero manipulada en el servlet (1) reportFileServlet o (2) exportServlet. This vulnerability allows remote attackers to disclose and delete files on vulnerable installations of Arcserve Unified Data Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within the exportServlet servlet. The issue lies in the failure to sanitize the path of files requested. • http://documentation.arcserve.com/Arcserve-UDP/Available/V5/ENU/Bookshelf_Files/HTML/Update%204/UDP_Update4_ReleaseNotes.html http://www.securityfocus.com/bid/74845 http://www.zerodayinitiative.com/advisories/ZDI-15-241 http://www.zerodayinitiative.com/advisories/ZDI-15-242 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 90%CPEs: 1EXPL: 0

The EdgeServiceImpl web service in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive credentials via a crafted SOAP request to the (1) getBackupPolicy or (2) getBackupPolicies method. El servicio web EdgeServiceImpl en Arcserve UDP anterior a 5.0 Update 4 permite a atacantes remotos obtener información sensible a través de una solicitud SOAP manipulada al método (1) getBackupPolicy o (2) getBackupPolicies. This vulnerability allows remote attackers to disclose information on vulnerable installations of Arcserve Unified Data Protection. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getBackupPolicies method of the EdgeServiceImpl web service. By sending a crafted SOAP request, this method will return an individual application's backup policies which contains sensitive credentials. • http://documentation.arcserve.com/Arcserve-UDP/Available/V5/ENU/Bookshelf_Files/HTML/Update%204/UDP_Update4_ReleaseNotes.html http://www.securityfocus.com/bid/74838 http://www.zerodayinitiative.com/advisories/ZDI-15-243 http://www.zerodayinitiative.com/advisories/ZDI-15-244 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 18EXPL: 0

Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server. Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versión de mantenimiento 4.71.001_179_060830, usado en múltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no actúa adecuadamente cuando múltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almacén de información, lo cual puede provocar que un usuario de Portal herede la sesión y credenciales de un usuario que está en otro servidor Portal. • http://secunia.com/advisories/23426 http://securitytracker.com/id?1017429 http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp http://www.osvdb.org/30854 http://www.securityfocus.com/archive/1/455041/100/0/threaded http://www.securityfocus.com/bid/21681 http://www.vupen.com/english/advisories/2006/5091 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876 •