3 results (0.007 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

NetGain Enterprise Manager (EM) is affected by OS Command Injection vulnerabilities in versions before 10.0.57. These vulnerabilities could allow remote authenticated attackers to inject arbitrary code, resulting in remote code execution. NetGain Enterprise Manager (EM) se ha visto afectado por vulnerabilidades de inyección de comandos en las versiones anteriores a la 10.0.57. Estas vulnerabilidades podrían permitir que los atacantes remotos autenticados inyecten código arbitrario, lo que resultaría en la ejecución remota de código. • https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-004 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

NetGain Enterprise Manager (EM) is affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities in versions before 10.1.12. NetGain Enterprise Manager (EM) se ha visto afectado por múltiples vulnerabilidades Cross-Site Scripting (XSS) persistente en las versiones anteriores a la 10.1.12. • https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2018-003 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in CORE: Repository for Oracle Enterprise Manager 9.0.1.0 and 9.2.0.1 has unknown impact and attack vectors, aka Oracle Vuln# EM01. Vulnerabilidad no especificada en CORE: Repository para Oracle Enterprise Manager 9.0.1.0 y 9.2.0.1 tiene un impacto desconocido y vectores de ataque, también conocido como Oracle Vuln# EM01. • http://secunia.com/advisories/21111 http://secunia.com/advisories/21165 http://securitytracker.com/id?1016529 http://www.oracle.com/technetwork/topics/security/cpujul2006-101315.html http://www.red-database-security.com/advisory/oracle_cpu_july_2006.html http://www.securityfocus.com/archive/1/440758/100/100/threaded http://www.securityfocus.com/bid/19054 http://www.us-cert.gov/cas/techalerts/TA06-200A.html http://www.vupen.com/english/advisories/2006/2863 http://www.vupen.c •