2 results (0.010 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier uses HTTP Basic Authentication, which transmits usernames and passwords in base64-encoded cleartext and allows remote attackers to steal the passwords and gain privileges. GE Fanuc Proficy Real-Time Information Portal 2.6 y versiones anteriores utiliza autenticación básica HTTP que transmite usuarios y contraseñas en texto en claro codificado base64 y permite a atacantes remotos robar las contraseñas y obtener priviliegios. • http://securityreason.com/securityalert/3590 http://securitytracker.com/id?1019273 http://support.gefanuc.com/support/index?page=kbchannel&id=KB12459 http://www.kb.cert.org/vuls/id/180876 http://www.securityfocus.com/archive/1/487075/100/0/threaded http://www.securityfocus.com/archive/1/487244/100/0/threaded http://www.securityfocus.com/bid/30754 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.5EPSS: 41%CPEs: 1EXPL: 1

Unrestricted file upload vulnerability in GE Fanuc Proficy Real-Time Information Portal 2.6 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension to the main virtual directory. Vulnerabilidad de subida de ficheros no restringida en GE Fanuc Proficy Real-Time Information Portal 2.6 y versiones anteriores permite a atacantes remotos ejecutar código de su elección al subir un fichero con una extensión ejecutable al directorio virtual principal. • https://www.exploit-db.com/exploits/6921 http://secunia.com/advisories/28678 http://securityreason.com/securityalert/3591 http://support.gefanuc.com/support/index?page=kbchannel&id=KB12460 http://www.kb.cert.org/vuls/id/339345 http://www.securityfocus.com/archive/1/487079/100/0/threaded http://www.securityfocus.com/archive/1/487242/100/0/threaded http://www.securityfocus.com/bid/27446 http://www.securitytracker.com/id?1019274 http://www.vupen.com/english/advisories/2008/ •