41 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 5

Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via the modules parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en axis2-admin/axis2-admin/engagingglobally en la consola de administración de Apache Axis2/Java v1.4.1, v1.5.1 y posiblemente otras versiones, usada en Business Objects 12, 3com IMC y posiblemente en otros productos, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro "modules". NOTA: algunos detalles han sido obtenidos a partir de terceros. • https://www.exploit-db.com/exploits/12689 http://osvdb.org/64844 http://secunia.com/advisories/39906 http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf http://www.exploit-db.com/exploits/12689 http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-03 http://www.securityfocus.com/archive/1/511404/100/0/threaded http://www.securityfocus.com/bid/40327 http://www.vupen.com/english/advisories/2010/1215 https://exchange.xforce.ibmcloud.com/ • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

The web management interface in 3Com Wireless 8760 Dual Radio 11a/b/g PoE Access Point allows remote attackers to cause a denial of service (device crash) via a malformed HTTP POST request. La interfaz de gestión Web de 3Com Wireless 8760 Dual Radio 11a/b/g PoE Access Point, permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) a través de una solicitud HTTP POST mal formada. • http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064226.html http://secunia.com/advisories/31714 http://www.securityfocus.com/bid/30988 http://www.securitytracker.com/id?1020807 https://exchange.xforce.ibmcloud.com/vulnerabilities/44890 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 2.6EPSS: 1%CPEs: 1EXPL: 0

The 3Com 3CRWER100-75 router with 1.2.10ww software, when remote management is disabled but a web server has been configured, serves a web page to external clients, which might allow remote attackers to obtain information about the router's existence and product details. El router 3Com 3CRWER100-75 con el software 1.2.10ww, cuando la administración remota está deshabilitada pero un servidor web ha sido configurado, sirve una página web a clientes externos, lo que permite a atacantes remotos obtener información sobre la existencia del router y los detalles del producto. • http://osvdb.org/45490 http://securityreason.com/securityalert/3217 http://www.securityfocus.com/archive/1/481977/100/0/threaded http://www.securityfocus.com/bid/26009 • CWE-16: Configuration CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

The 3Com 3CRWER100-75 router with 1.2.10ww software, when enabling an optional virtual server, configures this server to accept all source IP addresses on the external (Internet) interface unless the user selects other options, which might expose the router to unintended incoming traffic from remote attackers, as demonstrated by setting up a virtual server on port 80, which allows remote attackers to access the web management interface. El router 3Com 3CRWER100-75 con software 1.2.10ww, cuando se encuentra activada la opción de servidor virtual, configura este servidor para aceptar todas las fuentes IP sobre el interfaz externo (Internet) al menos que el usuario seleccione otras opciones, lo cual podria exponer al routera tráfico de entrada no intencionado desde ataques remotos, como se demostró a través de la configuración de un servidor virtual sobre el puerto 80, lo cual podría permitir a atacantes remotos acceder al interfaz de gestión web. • http://osvdb.org/43657 http://securityreason.com/securityalert/3217 http://www.securityfocus.com/archive/1/481977/100/0/threaded http://www.securityfocus.com/bid/26009 • CWE-16: Configuration •

CVSS: 7.5EPSS: 11%CPEs: 23EXPL: 3

TippingPoint IPS before 20070710 does not properly handle a hex-encoded alternate Unicode '/' (slash) character, which might allow remote attackers to send certain network traffic and avoid detection, as demonstrated by a cmd.exe attack. TippingPoint IPS versiones anteriores a 20070710 no maneja apropiadamente el alternativo codificado en hexadecimal de un caracter '/' (barra), lo cual podría permitir a atacantes remotos enviar determinado tráfico de red y evitar la detección, como se demuestra con un ataque de cmd.exe. • https://www.exploit-db.com/exploits/30287 http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064550.html http://osvdb.org/35970 http://secunia.com/advisories/26013 http://security-assessment.com/files/advisories/2007-07-11_Tippingpoint_IPS_Signature_Evasion.pdf http://www.3com.com/securityalert/alerts/3COM-07-003.html http://www.securityfocus.com/archive/1/473311/100/0/threaded http://www.securityfocus.com/bid/24855 http://www.securitytracker.com/id?1018361 http:/&#x • CWE-20: Improper Input Validation •