![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.17972 |
Categoría: | Web application abuses |
Título: | SonicWall SOHO Web Interface XSS Vulnerability |
Resumen: | SonicWall SOHO appliance are prone to a cross-site scripting; (XSS) vulnerability. |
Descripción: | Summary: SonicWall SOHO appliance are prone to a cross-site scripting (XSS) vulnerability. Vulnerability Insight: This version is vulnerable to multiple flaws, and in particular to a cross-site scripting due to a lack of sanitization of user-supplied data. Vulnerability Impact: Successful exploitation of this issue may allow an attacker to execute malicious script code on a vulnerable appliance. Solution: Update to the latest version of the product. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1006 BugTraq ID: 12984 http://www.securityfocus.com/bid/12984 Bugtraq: 20050404 SonicWALL SOHO/10 - XSS vulnerability (Google Search) http://archives.neohapsis.com/archives/bugtraq/2005-04/0041.html http://www.oliverkarow.de/research/SonicWall.txt http://www.osvdb.org/15261 http://www.osvdb.org/15262 http://securitytracker.com/id?1013638 http://secunia.com/advisories/14823 XForce ISS Database: sonicwall-http-get-requests-xss(19958) https://exchange.xforce.ibmcloud.com/vulnerabilities/19958 XForce ISS Database: sonicwall-username-code-execution(19960) https://exchange.xforce.ibmcloud.com/vulnerabilities/19960 |
Copyright | Copyright (C) 2005 David Maciejak |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |