Page 6 of 42 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered on Accellion FTA devices before FTA_9_12_180. By sending a POST request to home/seos/courier/web/wmProgressstat.html.php with an attacker domain in the acallow parameter, the device will respond with an Access-Control-Allow-Origin header allowing the attacker to have site access with a bypass of the Same Origin Policy. Se descubrió un problema en los dispositivos Accellion FTA anteriores a FTA_9_12_180. Al enviar una solicitud POST a home/seos/courier/web/wmProgressstat.html.php con un dominio atacante en el parámetro acallow, el dispositivo responderá con un encabezado Access-Control-Allow-Origin que permite al atacante tener acceso al sitio eludiendo la Same Origin Policy. • https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb • CWE-346: Origin Validation Error •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because mysql_real_escape_string is misused, seos/courier/communication_p2p.php allows SQL injection with the app_id parameter. Se descubrió un problema en los dispositivos Accellion FTA anteriores a FTA_9_12_180. Debido a que mysql_real_escape_string es utilizado erróneamente, seos/courier/communication_p2p.php permite inyección SQL con el parámetro app_id. • https://gist.github.com/anonymous/32e2894fa29176f3f32cb2b2bb7c24cb • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability on Accellion Kiteworks appliances before kw2016.03.00 allows remote attackers to read files via a crafted URI. Vulnerabilidad de salto de directorio en accesorios Accellion Kiteworks en versiones anteriores a kw2016.03.00 permite a atacantes remotos leer archivos a través de una URI manipulada. • http://www.kb.cert.org/vuls/id/305607 http://www.securityfocus.com/bid/92662 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Accellion Kiteworks appliances before kw2016.03.00 use setuid-root permissions for /opt/bin/cli, which allows local users to gain privileges via unspecified vectors. Accesorios Accellion Kiteworks en versiones anteriores a kw2016.03.00 usa permisos setuid-root para /opt/bin/cli, lo que permite a usuarios locales obtener privilegios a través de vectores no especificados. • http://www.kb.cert.org/vuls/id/305607 http://www.securityfocus.com/bid/92662 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in oauth_callback.php on Accellion Kiteworks appliances before kw2016.03.00 allow remote attackers to inject arbitrary web script or HTML via the (1) code, (2) error, or (3) error_description parameter. Múltiples vulnerabilidades de XSS en oauth_callback.php en accesorios Accellion Kiteworks en versiones anteriores a kw2016.03.00 permiten a atacantes remotos inyectar secuencias de comandos web y HTML arbitrarios a través de (1) el código, (2) el error o (3) el parámetro error_description. • http://www.kb.cert.org/vuls/id/305607 http://www.securityfocus.com/bid/92662 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •