7 results (0.007 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

A reflected Cross-site scripting (XSS) vulnerability in ShoreTel Connect ONSITE 18.82.2000.0 allows remote attackers to inject arbitrary web script or HTML via the page parameter. Una vulnerabilidad de Cross-Site Scripting (XSS) en ShoreTel Connect ONSITE 18.82.2000.0 permite a los atacantes remotos inyectar scripts web o HTML arbitrarios mediante el parámetro page. ShoreTel Connect ONSITE versions prior to 19.49.1500.0 suffer from cross site scripting and session fixation vulnerabilities. • https://www.exploit-db.com/exploits/46666 http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html https://github.com/Ramikan/Vulnerabilities/blob/master/Shoretel%20Connect%20Multiple%20Vulnerability • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 3

A reflected Cross-site scripting (XSS) vulnerability in ShoreTel Connect ONSITE 19.45.1602.0 allows remote attackers to inject arbitrary web script or HTML via the url parameter. Una vulnerabilidad de Cross-Site Scripting (XSS) en ShoreTel Connect ONSITE 19.45.1602.0 permite a los atacantes remotos inyectar scripts web o HTML arbitrarios mediante el parámetro url. ShoreTel Connect ONSITE versions prior to 19.49.1500.0 suffer from cross site scripting and session fixation vulnerabilities. • https://www.exploit-db.com/exploits/46666 http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html https://github.com/Ramikan/Vulnerabilities/blob/master/Shoretel%20Connect%20Multiple%20Vulnerability • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 3

A reflected Cross-site scripting (XSS) vulnerability in ShoreTel Connect ONSITE before 19.49.1500.0 allows remote attackers to inject arbitrary web script or HTML via the brandUrl parameter. Una vulnerabilidad de Cross-Site Scripting (XSS) en ShoreTel Connect ONSITE, en versiones anteriores a la 19.49.1500.0, permite a los atacantes remotos inyectar scripts web o HTML arbitrarios mediante el parámetro brandUrl. ShoreTel Connect ONSITE versions prior to 19.49.1500.0 suffer from cross site scripting and session fixation vulnerabilities. • https://www.exploit-db.com/exploits/46666 http://packetstormsecurity.com/files/152431/ShoreTel-Connect-ONSITE-Cross-Site-Scripting-Session-Fixation.html https://github.com/Ramikan/Vulnerabilities/blob/master/Shoretel%20Connect%20Multiple%20Vulnerability • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vendrecording.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application. Una vulnerabilidad en el componente conferencing de Mitel Connect ONSITE, en versiones R1711-PREM y anteriores y Mitel ST 14.2, release GA28 y anteriores, podría permitir que un atacante no autenticado inyecte código PHP empleando peticiones especialmente manipuladas en la página vendrecording.php. Su explotación con éxito podría permitir que un atacante ejecute código PHP arbitrario en el contexto de la aplicación. • https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vnewmeeting.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application. Una vulnerabilidad en el componente conferencing de Mitel Connect ONSITE, en versiones R1711-PREM y anteriores y Mitel ST 14.2, release GA28 y anteriores, podría permitir que un atacante no autenticado inyecte código PHP empleando peticiones especialmente manipuladas en la página vnewmeeting.php. Su explotación con éxito podría permitir que un atacante ejecute código PHP arbitrario en el contexto de la aplicación. • https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004 • CWE-94: Improper Control of Generation of Code ('Code Injection') •