Page 6 of 30 results (0.002 seconds)

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 0

Archer before 6.9 P1 (6.9.0.1) contains an improper access control vulnerability in an API. A remote authenticated malicious administrative user can potentially exploit this vulnerability to gather information about the system, and may use this information in subsequent attacks. Archer versiones anteriores a 6.9 P1 (6.9.0.1), contiene una vulnerabilidad de control de acceso inapropiado en una API. Un usuario administrativo malicioso autenticado remoto puede explotar esta vulnerabilidad para recopilar información sobre el sistema y puede usar esta información en ataques posteriores • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. A remote authenticated malicious attacker with access to service files may obtain sensitive information to use it in further attacks. Archer versiones anteriores a 6.8 P2 (6.8.0.2), está afectado por una vulnerabilidad de exposición de ruta. Un atacante malicioso autenticado remoto con acceso a archivos de servicio puede conseguir información confidencial para usarla en futuros ataques • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred. Archer versiones anteriores a 6.8 P2 (6.8.0.2), está afectado por una vulnerabilidad de redireccionamiento abierto. Un atacante privilegiado remoto puede potencialmente redireccionar a usuarios legítimos a sitios web arbitrarios y llevar a cabo ataques de phishing. • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 5.4EPSS: 0%CPEs: 4EXPL: 0

Archer before 6.8 P4 (6.8.0.4) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Archer versiones anteriores a 6.8 P4 (6.8.0.4), contiene una vulnerabilidad de tipo XSS almacenado. Un usuario de Archer malicioso autenticado remoto podría explotar esta vulnerabilidad para almacenar código HTML o JavaScript malicioso en un almacén confiable de datos de aplicación. • https://community.rsa.com/docs/DOC-115223 https://www.rsa.com/en-us/company/vulnerability-response-policy • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

RSA Archer 6.8 through 6.8.0.3 and 6.9 contains a URL injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability by tricking a victim application user into executing malicious JavaScript code in the context of the web application. RSA Archer versiones 6.8 hasta 6.8.0.3 y 6.9, contiene una vulnerabilidad de inyección URL. Un atacante no autenticado remoto podría explotar esta vulnerabilidad al engañar a un usuario de la aplicación víctima a ejecutar código JavaScript malicioso en el contexto de la aplicación web • https://community.rsa.com/docs/DOC-114997 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •