Page 3 of 26 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

21 Apr 2019 — In Gradle Enterprise before 2018.5.2, Build Cache Nodes would reflect the configured password back when viewing the HTML page source of the settings page. En Gradle Enterprise versiones anteriores a 2018.5.2, Build Cache Nodes reflejaría la contraseña configurada al ver el código fuente HTML de la página de configuración. • https://gradle.com/enterprise/releases/2018.5/#changes-2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

21 Apr 2019 — In Gradle Enterprise before 2018.5.3, Build Cache Nodes did not store the credentials at rest in an encrypted format. En Gradle Enterprise versiones anteriores a 2018.5.3, Build Cache Nodes no almacenaba las credenciales en un formato cifrado. • https://gradle.com/enterprise/releases/2018.5/#changes-3 • CWE-522: Insufficiently Protected Credentials •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

23 Aug 2012 — The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address. Filtering Service de Websense Enterprise v5.2 hasta 6.3 no considera la dirección IP durante la categorización de las URL, lo que facilita a los atacantes remotos evitar la filtración a través de una petición HTTP, ... • http://www.websense.com/support/article/t-kbarticle/Why-doesn-t-my-Websense-installation-categorize-URLs-and-Permit-Block-in-accordance-with-the-Site-Lookup-Tool-s-categorization • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 1%CPEs: 1EXPL: 0

06 Nov 2006 — The AirMagnet Enterprise console and Remote Sensor console (Laptop) in AirMagnet Enterprise before 7.5 build 6307 allows remote attackers to inject arbitrary web script or HTML from a certain embedded Internet Explorer object into an SSID template value, aka "Cross-Application Scripting (XAS)". La consola de AirMagnet Enterprise y la consola de Sensor Remoto (Laptop) en AirMagnet Enterprise anterior 7.5 construcción 6307 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección d... • http://secunia.com/advisories/22475 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

06 Nov 2006 — Multiple cross-site scripting (XSS) vulnerabilities in AirMagnet Enterprise before 7.5 build 6307 allow remote attackers to inject arbitrary web script or HTML via (1) the 404 error page of the Smart Sensor Edge Sensor; (2) the user name for a failed logon, when displayed in the audit journals reviewing interface (/AirMagnetSensor/AMSensor.dll/XH) by the Smart Sensor Edge Sensor log viewer; and (3) an SSID of an AP, when displayed on an ACL page (/Amom/Amom.dll/BD) of the Enterprise Server Status Overview i... • http://secunia.com/advisories/22475 •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

06 Nov 2006 — The console in AirMagnet Enterprise before 7.5 build 6307 does not properly validate the Enterprise Server certificate, which allows remote attackers to read network traffic via a man-in-the-middle (MITM) attack, possibly related to the use of self-signed certificates. La consola en AirMagnet Enterprise anterior a 7.5 construccion 6307 no valida adecuadamente el certificado de Enterprise Server, lo cual permite a atacantes remotos leer tráfico de red mediante un ataque de hombre-en-medio (man-in-the-middle ... • http://secunia.com/advisories/22475 •