Page 3 of 49 results (0.008 seconds)

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 3

The FileUploadServlet class in ManageEngine Desktop Central 9 before build 91093 allows remote attackers to upload and execute arbitrary files via the ConnectionId parameter. La clase FileUploadServlet en ManageEngine Desktop Central 9 anterior a la build 91093 permite que los atacantes remotos suban y ejecuten archivos arbitrarios mediante el parámetro ConnectionId. • https://www.exploit-db.com/exploits/38982 http://packetstormsecurity.com/files/134806/ManageEngine-Desktop-Central-9-FileUploadServlet-ConnectionId.html http://www.rapid7.com/db/modules/exploit/windows/http/manageengine_connectionid_write https://community.rapid7.com/community/infosec/blog/2015/12/14/r7-2015-22-manageengine-desktop-central-9-fileuploadservlet-connectionid-vulnerability-cve-2015-8249 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.0EPSS: 75%CPEs: 1EXPL: 4

ZOHO ManageEngine ServiceDesk Plus (SDP) before 9.0 build 9031 allows remote authenticated users to obtain sensitive ticket information via a (1) getTicketData action to servlet/AJaxServlet or a direct request to (2) swf/flashreport.swf, (3) reports/flash/details.jsp, or (4) reports/CreateReportTable.jsp. ZOHO ManageEngine ServiceDesk Plus (SDP) anterior a 9.0 build 9031 permite a usuarios remotos autenticados obtener información sensible sobre tickets a través de (1) una acción getTicketData en servlet/AJaxServlet o una solicitud directa a (2) swf/flashreport.swf, (3) reports/flash/details.jsp, o (4) reports/CreateReportTable.jsp. • https://www.exploit-db.com/exploits/35904 http://osvdb.org/show/osvdb/117499 http://packetstormsecurity.com/files/130081/ManageEngine-ServiceDesk-Plus-9.0-Privilege-Escalation.html http://www.exploit-db.com/exploits/35904 http://www.manageengine.com/products/service-desk/readme-9.0.html http://www.rewterz.com/vulnerabilities/manageengine-servicedesk-plus-user-privileges-management-vulnerability http://www.securityfocus.com/archive/1/534538/100/0/threaded http://www.securityfocus.com/bid/72302 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 75%CPEs: 4EXPL: 2

Directory traversal vulnerability in ServiceDesk Plus and Plus MSP v5 through v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4 allows remote authenticated users to execute arbitrary code. Existe una vulnerabilidad de salto de directorio en ServiceDesk Plus y Plus MSP de la v5 a la v9.0 v9030; AssetExplorer de la v4 a la v6.1; SupportCenter de la v5 a la v7.9 y en IT360 de la v8 a la v10.4 que permite que los usuarios remotos autenticados ejecuten código arbitrario. ManageEngine products Service Desk Plus, Asset Explorer, Support Center, and IT360 suffer from file upload and directory traversal vulnerabilities. • http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html http://seclists.org/fulldisclosure/2015/Jan/12 http://seclists.org/fulldisclosure/2015/Jan/5 http://secunia.com/advisories/62105 http://secunia.com/advisories/62121 http://www.securityfocus.com/archive/1/534377/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/99611 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.0EPSS: 97%CPEs: 4EXPL: 4

Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4. Existe una vulnerabilidad de salto de directorio en ServiceDesk Plus MSP de la v5 a la v9.0 v9030; AssetExplorer de la v4 a la v6.1; SupportCenter de la v5 a la v7.9 y en IT360 de la v8 a la v10.4. ManageEngine products Service Desk Plus, Asset Explorer, Support Center, and IT360 suffer from file upload and directory traversal vulnerabilities. • https://www.exploit-db.com/exploits/35845 http://packetstormsecurity.com/files/129806/ManageEngine-Shell-Upload-Directory-Traversal.html http://packetstormsecurity.com/files/130020/ManageEngine-Multiple-Products-Authenticated-File-Upload.html http://seclists.org/fulldisclosure/2015/Jan/5 http://secunia.com/advisories/62105 http://www.securityfocus.com/archive/1/534377/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/99610 https://seclists.org/fulldisclosure/2015/Jan/5 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.4EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in the UploadAccountActivities servlet in ManageEngine Password Manager Pro (PMP) before 7103 allows remote attackers to delete arbitrary files via a .. (dot dot) in a filename. Vulnerabilidad de salto de directorio en el servlet UploadAccountActivities en ManageEngine Password Manager Pro (PMP) anterior a 7103 permite a atacantes remotos eliminar ficheros arbitrarios a través de un .. (punto punto) en el nombre del fichero. This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of ManageEngine Password Manager Pro. • http://www.manageengine.com/products/passwordmanagerpro/release-notes.html http://www.zerodayinitiative.com/advisories/ZDI-14-421 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •