3 results (0.002 seconds)

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

SQL injection vulnerability in the Guest Login Portal in the Sophos Cyberoam appliances with CyberoamOS before 10.6.1 GA allows remote attackers to execute arbitrary SQL commands via the add_guest_user opcode. Vulnerabilidad de inyección SQL en el portal de inicio de sesión de huéspedes en los dispositivos Sophos Cyberoam con CyberoamOS anterior a 10.6.1 GA permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del código de operación add_guest_user. This vulnerability allows remote attackers to execute arbitrary SQL on vulnerable installations of Sophos Cyberoam. Authentication is not required to exploit this vulnerability. The specific flaw exists within the add_guest_user opcode. The issue lies in the failure to properly sanitize the specified mobile number prior to executing a SQL query. • http://kb.cyberoam.com/default.asp?id=3049 http://www.zerodayinitiative.com/advisories/ZDI-14-329 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.0EPSS: 2%CPEs: 2EXPL: 0

The Sophos Cyberoam appliances with CyberoamOS before 10.6.1 GA allows remote authenticated users to inject arbitrary commands via a (1) checkcert_key, (2) webclient_portal_settings, (3) sslvpn_liveuser_delete, or (4) ccc_flush_sql_file opcode. Los dispositivos Sophos Cyberoam con CyberoamOS anterior a 10.6.1 GA permite a usuarios remotos autenticados inyectar comandos arbitrarios a través de un código de operación (1) checkcert_key, (2) webclient_portal_settings, (3) sslvpn_liveuser_delete, o (4) ccc_flush_sql_file. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. Authentication is required to exploit this vulnerability. The specific flaw exists within the sslvpn_liveuser_delete opcode. The issue lies in the failure to properly sanitize user-supplied input before executing commands. • http://kb.cyberoam.com/default.asp?id=3049 http://www.zerodayinitiative.com/advisories/ZDI-14-328 http://www.zerodayinitiative.com/advisories/ZDI-14-331 http://www.zerodayinitiative.com/advisories/ZDI-14-332 http://www.zerodayinitiative.com/advisories/ZDI-14-333 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 19%CPEs: 2EXPL: 0

Stack-based buffer overflow in the diagnose service in the Sophos Cyberoam appliances with CyberoamOS before 10.6.1 GA allows remote attackers to execute arbitrary code via a crafted webpage or file. Desbordamiento de buffer basado en pila en el servicio de diagnóstica en los dispositivos Sophos Cyberoam with CyberoamOS anterior a 10.6.1 GA permite a atacantes remotos ejecutar código arbitrario a través de una página web manipulada o un fichero manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the diagnose service. The issue lies in the failure to validate the size of the input buffer before copying it into a fixed-size buffer on the stack. • http://kb.cyberoam.com/default.asp?id=3049 http://www.zerodayinitiative.com/advisories/ZDI-14-334 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •