4 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 1

A shell injection vulnerability on the Sophos Cyberoam firewall appliance with CyberoamOS before 10.6.6 MR-6 allows remote attackers to execute arbitrary commands via the Web Admin and SSL VPN consoles. Una vulnerabilidad de inyección de shell en el dispositivo de firewall Sophos Cyberoam con CyberoamOS versiones anteriores a 10.6.6 MR-6, permite a atacantes remotos ejecutar comandos arbitrarios por medio de las consolas de Web Admin y SSL VPN. • https://community.sophos.com/kb/en-us/134732 https://community.sophos.com/products/cyberoamos https://thebestvpn.com/cyberoam-preauth-rce • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

An XSS vulnerability allows remote attackers to execute arbitrary client side script on vulnerable installations of Sophos Cyberoam firewall devices with firmware through 10.6.4. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of a request to the "LiveConnectionDetail.jsp" application. GET parameters "applicationname" and "username" are improperly sanitized allowing an attacker to inject arbitrary JavaScript into the page. This can be abused by an attacker to perform a cross-site scripting attack on the user. • https://www.exploit-db.com/exploits/42062 http://seclists.org/bugtraq/2017/Jun/4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 1

Sophos Cyberoam UTM CR25iNG 10.6.3 MR-5 allows remote authenticated users to bypass intended access restrictions via direct object reference, as demonstrated by a request for Licenseinformation.jsp. This is fixed in 10.6.5. Sophos Cyberoam UTM CR25iNG 10.6.3 El MR-5 permite a usuarios autenticados remotos pasar por alto las restricciones de acceso deseadas a través de la referencia de objeto directo, como lo demuestra una solicitud de Licenseinformation.jsp. Esto se fija en 10.6.5. Sophos Cyberoam UTM CR25iNG version 10.6.3 MR-5 suffers from an insecure direct object reference vulnerability. • https://www.exploit-db.com/exploits/44469 https://infosecninja.blogspot.in/2017/04/cve-2016-7786-sophos-cyberoam-utm.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Sophos Cyberoam CR100iNG UTM appliance with firmware 10.6.3 MR-1 build 503, CR35iNG UTM appliance with firmware 10.6.2 MR-1 build 383, and CR35iNG UTM appliance with firmware 10.6.2 Build 378 allow remote attackers to inject arbitrary web script or HTML via the (1) ipFamily parameter to corporate/webpages/trafficdiscovery/LiveConnections.jsp; the (2) ipFamily, (3) applicationname, or (4) username parameter to corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp; or the (5) X-Forwarded-For HTTP header. Múltiples vulnerabilidades de XSS en dispositivos Sophos Cyberoam CR100iNG UTM con firmware 10.6.3 MR-1 build 503, dispositivos CR35iNG UTM con firmware 10.6.2 MR-1 build 383 y dispositivos CR35iNG UTM con firmware 10.6.2 Build 378 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) ipFamily en corporate/webpages/trafficdiscovery/LiveConnections.jsp; el parámetro (2) ipFamily, (3) applicationname o (4) username en corporate/webpages/trafficdiscovery/LiveConnectionDetail.jsp; o (5) la cabecera X-Forwarded-For HTTP. • http://packetstormsecurity.com/files/136561/Sophos-Cyberoam-NG-Series-Cross-Site-Scripting.html http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5313.php • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •