4 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Parallels SiteStudio before 1.7.2, and 1.8.x before 1.8b, as used in Parallels H-Sphere 3.0 before Patch 9 and 2.5 before Patch 11, has unknown impact and attack vectors. Vulnerabilidad no especificada en Parallels SiteStudio en versiones anteriores a 1.7.2, y 1.8.x en versiones anteriores 1.8b, como lo utilizado en Parallels H-Sphere 3.0 en versiones anteriores a Patch 9 y 2.5 en versiones anteriores a Patch 11, tiene un efecto y vectores de ataque desconocidos. • http://secunia.com/advisories/29084 http://www.psoft.net/misc/hs_ss_technical_update.html http://www.securityfocus.com/bid/28002 http://www.securitytracker.com/id?1019506 https://exchange.xforce.ibmcloud.com/vulnerabilities/40846 •

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in H-Sphere 2.5.1 Beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) next_template, (2) start, (3) curr_menu_id, and (4) arid parameters in psoft/servlet/resadmin/psoft.hsphere.CP when using the mailman/massmail.html template_name. Vulnerabilidad de secuencias de comandos en H-Sphere v2.5.1 Beta v1 y anteriores permiten a atacantes remotos inyectar código web o HTML de su elección a través de los parámetros (1) next_template, (2) start, (3) curr_menu_id, y (4) arid en psoft/servlet/resadmin/psoft.hsphere.CP cuando es usado mailman/massmail.html template_name. • http://pridels0.blogspot.com/2006/06/h-sphere-25x-xss-vuln.html http://secunia.com/advisories/20798 http://www.osvdb.org/26863 http://www.securityfocus.com/bid/18677 http://www.vupen.com/english/advisories/2006/2550 https://exchange.xforce.ibmcloud.com/vulnerabilities/27381 •

CVSS: 7.5EPSS: 18%CPEs: 1EXPL: 3

Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist. • https://www.exploit-db.com/exploits/22128 https://www.exploit-db.com/exploits/22129 http://psoft.net/misc/webshell_patch.html http://secunia.com/advisories/7832 http://www.iss.net/security_center/static/10999.php http://www.iss.net/security_center/static/11002.php http://www.iss.net/security_center/static/11003.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6527 http://www.securityfocus.com/bid/6537 http://www.securityfocus.co •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

H-Sphere WebShell 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) mode and (2) zipfile parameters in a URL request. • http://psoft.net/misc/webshell_patch.html http://www.iss.net/security_center/static/11001.php http://www.securityfocus.com/archive/1/305313 http://www.securityfocus.com/bid/6537 http://www.securityfocus.com/bid/6539 http://www.securitytracker.com/id?1005893 •