Page 6 of 43 results (0.005 seconds)

CVSS: 5.4EPSS: 0%CPEs: 4EXPL: 0

RSA Archer before 6.9 SP1 P1 (6.9.1.1) contains a stored XSS vulnerability. A remote authenticated malicious Archer user with access to modify link name fields could potentially exploit this vulnerability to execute code in a victim's browser. RSA Archer versiones anteriores a 6.9 SP1 P1 (6.9.1.1) contiene una vulnerabilidad de tipo XSS almacenado. Un usuario de Archer malicioso autenticado remoto con acceso para modificar un campo link name podría explotar esta vulnerabilidad para ejecutar código en el navegador de la víctima • https://community.rsa.com/t5/archer-product-advisories/rsa-2021-04-archer-an-rsa-business-update-for-multiple/ta-p/603223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 0

Archer before 6.9 P1 (6.9.0.1) contains an improper access control vulnerability in an API. A remote authenticated malicious administrative user can potentially exploit this vulnerability to gather information about the system, and may use this information in subsequent attacks. Archer versiones anteriores a 6.9 P1 (6.9.0.1), contiene una vulnerabilidad de control de acceso inapropiado en una API. Un usuario administrativo malicioso autenticado remoto puede explotar esta vulnerabilidad para recopilar información sobre el sistema y puede usar esta información en ataques posteriores • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. A remote authenticated malicious attacker with access to service files may obtain sensitive information to use it in further attacks. Archer versiones anteriores a 6.8 P2 (6.8.0.2), está afectado por una vulnerabilidad de exposición de ruta. Un atacante malicioso autenticado remoto con acceso a archivos de servicio puede conseguir información confidencial para usarla en futuros ataques • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred. Archer versiones anteriores a 6.8 P2 (6.8.0.2), está afectado por una vulnerabilidad de redireccionamiento abierto. Un atacante privilegiado remoto puede potencialmente redireccionar a usuarios legítimos a sitios web arbitrarios y llevar a cabo ataques de phishing. • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 5.4EPSS: 0%CPEs: 4EXPL: 0

Archer before 6.8 P4 (6.8.0.4) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Archer versiones anteriores a 6.8 P4 (6.8.0.4), contiene una vulnerabilidad de tipo XSS almacenado. Un usuario de Archer malicioso autenticado remoto podría explotar esta vulnerabilidad para almacenar código HTML o JavaScript malicioso en un almacén confiable de datos de aplicación. • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •