Page 5 of 54 results (0.010 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network. La implementación del servidor OpenID Connect para MITREid Connect versiones hasta 1.3.3, contiene una vulnerabilidad de Server Side Request Forgery (SSRF). • https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases https://portswigger.net/research/hidden-oauth-attack-vectors • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

A malicious website could execute code remotely in Sophos Connect Client before version 2.1. Un sitio web malicioso podría ejecutar código remotamente en Sophos Connect Client versiones anteriores a 2.1 • https://community.sophos.com/b/security-blog https://community.sophos.com/b/security-blog/posts/resolved-rce-in-sophos-connect-client-for-windows-cve-2021-25265 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Adobe Connect version 11.0.7 (and earlier) is affected by an Input Validation vulnerability in the export feature. An attacker could exploit this vulnerability by injecting a payload into an online event form and achieve code execution if the victim exports and opens the data on their local machine. La versión 11.0.7 de Adobe Connect (y anteriores) se ve afectada por una vulnerabilidad de Validación de Entradas en la función de exportación. Un atacante podría aprovechar esta vulnerabilidad inyectando una carga útil en un formulario de eventos en línea y lograr la ejecución de código si la víctima exporta y abre los datos en su máquina local • https://helpx.adobe.com/security/products/connect/apsb21-19.html • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Adobe Connect version 11.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious JavaScript content that may be executed within the context of the victim's browser when they browse to the page containing the vulnerable field. Adobe Connect versiones 11.0.7 (y anteriores), está afectado por una vulnerabilidad de tipo Cross-Site Scripting (XSS) reflejado. Un atacante podría explotar esta vulnerabilidad para inyectar contenido JavaScript malicioso que puede ser ejecutado dentro del contexto del navegador de la víctima cuando navega a la página que contiene el campo vulnerable • https://helpx.adobe.com/security/products/connect/apsb21-19.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Adobe Connect version 11.0.7 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this vulnerability to inject malicious JavaScript content that may be executed within the context of the victim's browser when they browse to the page containing the vulnerable field. Adobe Connect versiones 11.0.7 (y anteriores), está afectado por una vulnerabilidad de tipo Cross-Site Scripting (XSS) reflejado. Un atacante podría explotar esta vulnerabilidad para inyectar contenido JavaScript malicioso que puede ejecutarse dentro del contexto del navegador de la víctima cuando navega a la página que contiene el campo vulnerable • https://helpx.adobe.com/security/products/connect/apsb21-19.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •