5 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Parallels SiteStudio before 1.7.2, and 1.8.x before 1.8b, as used in Parallels H-Sphere 3.0 before Patch 9 and 2.5 before Patch 11, has unknown impact and attack vectors. Vulnerabilidad no especificada en Parallels SiteStudio en versiones anteriores a 1.7.2, y 1.8.x en versiones anteriores 1.8b, como lo utilizado en Parallels H-Sphere 3.0 en versiones anteriores a Patch 9 y 2.5 en versiones anteriores a Patch 11, tiene un efecto y vectores de ataque desconocidos. • http://secunia.com/advisories/29084 http://www.psoft.net/misc/hs_ss_technical_update.html http://www.securityfocus.com/bid/28002 http://www.securitytracker.com/id?1019506 https://exchange.xforce.ibmcloud.com/vulnerabilities/40846 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The control panel for Positive Software H-Sphere before 2.5.0 RC3 creates log files in a user's directory with insecure permissions, which allows local users to append log data to arbitrary files via a symlink attack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. El panel de control para Positive Software H-Sphere versiones anteriores a 2.5.0 RC3 crea ficheros de log en directorio de usuario con permisos no seguros, que permite a usuarios locales añadir datos de log a ficheros de su elección mediante ataque de enlaces simbólicos. NOTA: El origen de esta información es desconocido. Los detalles se han obtenido exclusivamente de información de terceros. • http://secunia.com/advisories/23199 http://www.securityfocus.com/bid/21436 https://exchange.xforce.ibmcloud.com/vulnerabilities/30753 •

CVSS: 2.6EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in H-Sphere 2.5.1 Beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) next_template, (2) start, (3) curr_menu_id, and (4) arid parameters in psoft/servlet/resadmin/psoft.hsphere.CP when using the mailman/massmail.html template_name. Vulnerabilidad de secuencias de comandos en H-Sphere v2.5.1 Beta v1 y anteriores permiten a atacantes remotos inyectar código web o HTML de su elección a través de los parámetros (1) next_template, (2) start, (3) curr_menu_id, y (4) arid en psoft/servlet/resadmin/psoft.hsphere.CP cuando es usado mailman/massmail.html template_name. • http://pridels0.blogspot.com/2006/06/h-sphere-25x-xss-vuln.html http://secunia.com/advisories/20798 http://www.osvdb.org/26863 http://www.securityfocus.com/bid/18677 http://www.vupen.com/english/advisories/2006/2550 https://exchange.xforce.ibmcloud.com/vulnerabilities/27381 •

CVSS: 4.3EPSS: 0%CPEs: 32EXPL: 0

Cross-site scripting (XSS) vulnerability in the Hosting Control Panel (psoft.hsphere.CP) in Positive Software H-Sphere 2.4.3 Patch 8 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter in a login action. • http://secunia.com/advisories/18447 http://www.osvdb.org/22372 http://www.psoft.net/HSdocumentation/versions/?v=all&p=r http://www.psoft.net/HSdocumentation/versions/index.php?v=243p9&p=r http://www.securityfocus.com/archive/1/421704/100/0/threaded http://www.vupen.com/english/advisories/2006/0172 https://exchange.xforce.ibmcloud.com/vulnerabilities/24096 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 3

H-Sphere Winbox 2.4.2 and 2.4.3 RC1 stores sensitive information such as username and password in plaintext in world-readable log files, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/25636 http://exploitlabs.com/files/advisories/EXPL-A-2005-007-hsphere.txt http://secunia.com/advisories/15287 http://www.osvdb.org/16239 http://www.psoft.net/misc/hsphere_winbox_security_update_passwd.html http://www.securityfocus.com/bid/13559 https://exchange.xforce.ibmcloud.com/vulnerabilities/20522 •