Page 3 of 12 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Bitdefender GravityZone VMware appliance before 6.2.1-35 might allow attackers to gain access with root privileges via unspecified vectors. Bitdefender GravityZone VMware en versiones anteriores a la 6.2.1-35 podría permitir que los atacantes obtengan acceso con privilegios root mediante vectores sin especificar. • https://www.bitdefender.com/support/bitdefender-gravityzone-6-2-1-35-release-notes-1909.html •

CVSS: 5.0EPSS: 17%CPEs: 1EXPL: 3

Multiple directory traversal vulnerabilities in Bitdefender GravityZone before 5.1.11.432 allow remote attackers to read arbitrary files via a (1) .. (dot dot) in the id parameter to webservice/CORE/downloadFullKitEpc/a/1 in the Web Console or (2) %2E%2E (encoded dot dot) in the default URI to port 7074 on the Update Server. Múltiples vulnerabilidades de salto de directorio en Bitdefender GravityZone anterior a 5.1.11.432 permiten a atacantes remotos leer ficheros arbitrarios a través de un (1) .. (punto punto) en el parámetro id en webservice/CORE/downloadFullKitEpc/a/1 en la consola web o (2) %2E%2E (punto punto codificado) en la URI por defecto en el puerto 7074 en el servidor de actualización. • https://www.exploit-db.com/exploits/34086 http://seclists.org/fulldisclosure/2014/Jul/78 http://www.bitdefender.com/support/how-to-configure-iptables-firewall-rules-on-gravityzone-for-restricting-outside-access-to-mongodatabase-1265.html https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-3_Bitdefender_GravityZone_Multiple_critical_vulnerabilities_v10.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •