2 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 4EXPL: 1

15 Mar 2019 — Cobham Satcom Sailor 250 and 500 devices before 1.25 contained persistent XSS, which could be exploited by an unauthenticated threat actor via the /index.lua?pageID=Phone%20book name field. Los dispositivos Cobham Satcom Sailor 250 y 500, en versiones anteriores a la 1.25, contienen Cross-Site Scripting (XSS) persistente, que puede ser explotado por un actor de amenaza no autenticado mediante el campo de nombre en /index.lua?pageID=Phone%20book. • https://cyberskr.com/blog/cobham-satcom-250-500.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 1

15 Mar 2019 — Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields). Los dispositivos Cobham Satcom Sailor 250 y 500, en versiones anteriores a la 1.25... • https://cyberskr.com/blog/cobham-satcom-250-500.html • CWE-287: Improper Authentication •