Page 8 of 40 results (0.009 seconds)

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. RSA Archer, en versiones anteriores a la 6.4.0.1, contiene una vulnerabilidad de Cross-Site Scripting (XSS) persistente. Un usuario autenticado remoto malicioso de Archer podría explotar esta vulnerabilidad para almacenar código HTML o JavaScript malicioso en un almacén de datos de aplicación de confianza. • http://seclists.org/fulldisclosure/2018/Jul/69 http://www.securityfocus.com/bid/104892 http://www.securitytracker.com/id/1041359 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

RSA Archer GRC Platform prior to 6.2.0.5 is affected by stored cross-site scripting via the Source Asset ID field. An authenticated attacker may potentially exploit this to execute arbitrary HTML in the user's browser session in the context of the affected RSA Archer application. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por un Cross-Site Scripting (XSS) persistente mediante el campo Source Asset ID. Un atacante autenticado podría explotarlo para ejecutar HTML arbitrario en la sesión del buscador del usuario, en el contexto de una aplicación RSA Archer afectada. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securitytracker.com/id/1039518 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

RSA Archer GRC Platform prior to 6.2.0.5 is affected by reflected cross-site scripting via the request URL. Attackers could potentially exploit this to execute arbitrary HTML in the user's browser session in the context of the affected RSA Archer application. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por un Cross-Site Scripting (XSS) reflejado mediante la URL de petición. Los atacantes podrían explotarlo para ejecutar HTML arbitrario en la sesión del buscador del usuario, en el contexto de una aplicación RSA Archer afectada. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securityfocus.com/bid/101195 http://www.securitytracker.com/id/1039518 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

RSA Archer GRC Platform prior to 6.2.0.5 is affected by reflected cross-site scripting vulnerabilities via certain RSA Archer Help pages. Attackers could potentially exploit this to execute arbitrary HTML in the user's browser session in the context of the affected RSA Archer application. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por vulnerabilidades de Cross-Site Scripting (XSS) reflejado mediante ciertas páginas de ayuda de RSA Archer. Los atacantes podrían explotarlo para ejecutar código HTML arbitrario en la sesión del buscador del usuario, en el contexto de una aplicación RSA Archer afectada. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securityfocus.com/bid/101195 http://www.securitytracker.com/id/1039518 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

RSA Archer GRC Platform prior to 6.2.0.5 is affected by a privilege escalation vulnerability. A low privileged RSA Archer user may potentially exploit this vulnerability to elevate their privileges and export certain application records. La plataforma RSA Archer GRC en versiones anteriores a la 6.2.0.5 se ve afectada por una vulnerabilidad de escalado de privilegios. Un usuario de RSA Archer con un bajo nivel de privilegios podría explotar esta vulnerabilidad para elevar sus privilegios y exportar los registros de alguna aplicación. • http://seclists.org/fulldisclosure/2017/Oct/12 http://www.securityfocus.com/bid/101195 http://www.securitytracker.com/id/1039518 •