Page 7 of 39 results (0.003 seconds)

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

RSA Archer, versions prior to 6.7 P2 (6.7.0.2), contains a Document Object Model (DOM) based cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to DOM environment in the browser. The malicious code is then executed by the web browser in the context of the vulnerable web application. RSA Archer, versiones anteriores a la versión 6.7 P2 (6.7.0.2), contiene una vulnerabilidad de tipo cross-site scripting basada en Document Object Model (DOM). Un atacante remoto no autenticado podría explotar potencialmente esta vulnerabilidad al engañar a un usuario víctima de la aplicación para que suministre código HTML o JavaScript malicioso hacia el entorno DOM en el navegador. • https://www.dell.com/support/security/en-us/details/DOC-111112/DSA-2020-049-RSA-Archer-Security-Update-for-Multiple-Vulnerabilities • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to view unauthorized information. RSA Archer, versiones anteriores a la versión 6.7 P3 (6.7.0.3), contienen una vulnerabilidad de omisión de autorización en la API REST. Un usuario de Archer malicioso autenticado remoto podría explotar potencialmente esta vulnerabilidad para visualizar información no autorizada. • https://www.dell.com/support/security/en-us/details/DOC-111112/DSA-2020-049-RSA-Archer-Security-Update-for-Multiple-Vulnerabilities • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability to execute arbitrary commands on the system where the vulnerable application is deployed. RSA Archer, versiones anteriores a la versión 6.7 P3 (6.7.0.3), contienen una vulnerabilidad de inyección de comandos. Un usuario malicioso autenticado con privilegios de administrador podría explotar potencialmente esta vulnerabilidad para ejecutar comandos arbitrarios en el sistema donde es implementada la aplicación vulnerable. • https://www.dell.com/support/security/en-us/details/DOC-111112/DSA-2020-049-RSA-Archer-Security-Update-for-Multiple-Vulnerabilities • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. RSA Archer, versiones anteriores a la versión 6.7 P3 (6.7.0.3), contienen una vulnerabilidad de exposición de información. La información de sesión de los usuarios podría ser almacenada potencialmente en la caché o los archivos de registro. • https://www.dell.com/support/security/en-us/details/DOC-111112/DSA-2020-049-RSA-Archer-Security-Update-for-Multiple-Vulnerabilities • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-598: Use of GET Request Method With Sensitive Query Strings •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts. RSA Archer, versiones anteriores a 6.6 P2 (6.6.0.2), contienen una vulnerabilidad de autenticación inapropiada. La vulnerabilidad permite a los administradores de sistema crear cuentas de usuario con credenciales insuficientes. • https://community.rsa.com/docs/DOC-106759 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-521: Weak Password Requirements •