Page 3 of 32 results (0.009 seconds)

CVSS: 6.1EPSS: 0%CPEs: 63EXPL: 0

An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via one of attributes in webmail URLs to execute arbitrary JavaScript code, leading to information disclosure. Se descubrió un problema en Zimbra Collaboration (ZCS) 9.0. XSS puede ocurrir a través de uno de los atributos en las URL de correo web para ejecutar código JavaScript arbitrario, lo que lleva a la divulgación de información. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. Remote code execution can occur through ClientUploader by an authenticated admin user. An authenticated admin user can upload files through the ClientUploader utility, and traverse to any other directory for remote code execution. Se descubrió un problema en Zimbra Collaboration (ZCS) 8.8.15 y 9.0. La ejecución remota de código puede realizarse a través de ClientUploader por parte de un usuario administrador autenticado. • https://gist.github.com/Threonic/e90c85e11e1ac925ff57783988779e76 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Zimbra Collaboration Suite (ZCS) 8.8.15, at the URL /h/calendar, one can trigger XSS by adding JavaScript code to the view parameter and changing the value of the uncheck parameter to a string (instead of default value of 10). En Zimbra Collaboration Suite (ZCS) 8.8.15, en la URL /h/calendar, puede desencadenarse un ataque de tipo XSS al añadir código JavaScript al parámetro view y cambiando el valor del parámetro uncheck a una cadena (en lugar del valor por defecto de 10) • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Zimbra Collaboration Suite (ZCS) 8.8.15, /h/search?action=voicemail&action=listen accepts a phone parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine. En Zimbra Collaboration Suite (ZCS) versión 8.8.15, /h/search?action=voicemail&action=listen acepta un parámetro phone que es vulnerable a un ataque de tipo XSS Reflejado. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/compose accepts an attachUrl parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine. En Zimbra Collaboration Suite (ZCS) versión 8.8.15, la URL en /h/compose acepta un parámetro attachUrl que es vulnerable a un ataque de tipo XSS Reflejado. Esto permite una ejecución de JavaScript arbitrario en la máquina de la víctima • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •