2 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in the login page in Check Point VPN-1 UTM Edge W Embedded NGX 7.0.48x allows remote attackers to inject arbitrary web script or HTML via the user parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la página de entrada de usuarios de Check Point VPN-1 UTM Edge W Embedded NGX 7.0.48x permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámentro useCheck Point VPN-1 UTM r (usuario). • https://www.exploit-db.com/exploits/31340 http://secunia.com/advisories/29243 http://www.louhi.fi/advisory/checkpoint_080306.txt http://www.securityfocus.com/archive/1/489203/100/0/threaded http://www.securityfocus.com/bid/28116 http://www.securitytracker.com/id?1019554 http://www.vupen.com/english/advisories/2008/0788 https://exchange.xforce.ibmcloud.com/vulnerabilities/41032 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk34520 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in pop/WizU.html in the management interface in Check Point VPN-1 Edge X Embedded NGX 7.0.33x on the Check Point VPN-1 UTM Edge allows remote attackers to perform privileged actions as administrators, as demonstrated by a request with the swuuser and swupass parameters, which adds an administrator account. NOTE: the CSRF attack has no timing window because there is no logout capability in the management interface. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en pop/WizU.html en la interfaz de administración de Check Point VPN-1 Edge X Embedded NGX 7.0.33x en el Check Point VPN-1 UTM Edge permite a atacantes remotos realizar acciones privilegiadas como administradores, como se ha demostrado utilizando una petición con los parámetros swuuser y swupass, lo cual añade una cuenta de administrador. NOTA: el ataque CSRF no tiene una ventana de tiempo porque no hay capacidad de desconexión en la interfaz de administración. • http://osvdb.org/37645 http://secunia.com/advisories/25853 http://securityreason.com/securityalert/2848 http://www.louhi.fi/advisory/checkpoint_070626.txt http://www.securityfocus.com/archive/1/472371/100/0/threaded http://www.vupen.com/english/advisories/2007/2363 https://exchange.xforce.ibmcloud.com/vulnerabilities/35103 •