Filtered by vendor Rsa
Subscribe
Total
112 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-29538 | 1 Rsa | 1 Archer | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
Archer before 6.9 P1 (6.9.0.1) contains an improper access control vulnerability in an API. A remote authenticated malicious administrative user can potentially exploit this vulnerability to gather information about the system, and may use this information in subsequent attacks. | |||||
CVE-2020-5337 | 1 Rsa | 1 Archer | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites. | |||||
CVE-2020-5333 | 1 Rsa | 1 Archer | 2024-02-04 | 4.0 MEDIUM | 4.3 MEDIUM |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to view unauthorized information. | |||||
CVE-2020-5334 | 1 Rsa | 1 Archer | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
RSA Archer, versions prior to 6.7 P2 (6.7.0.2), contains a Document Object Model (DOM) based cross-site scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to DOM environment in the browser. The malicious code is then executed by the web browser in the context of the vulnerable web application. | |||||
CVE-2020-5384 | 1 Rsa | 1 Multifactor Authentication Agent | 2024-02-04 | 7.2 HIGH | 8.4 HIGH |
Authentication Bypass Vulnerability RSA MFA Agent 2.0 for Microsoft Windows contains an Authentication Bypass vulnerability. A local unauthenticated attacker could potentially exploit this vulnerability by using an alternate path to bypass authentication in order to gain full access to the system. | |||||
CVE-2020-5336 | 1 Rsa | 1 Archer | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious JavaScript code on the affected system. | |||||
CVE-2020-5331 | 1 Rsa | 1 Archer | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. | |||||
CVE-2020-5332 | 1 Rsa | 1 Archer | 2024-02-04 | 9.0 HIGH | 7.2 HIGH |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability to execute arbitrary commands on the system where the vulnerable application is deployed. | |||||
CVE-2020-5335 | 1 Rsa | 1 Archer | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
RSA Archer, versions prior to 6.7 P2 (6.7.0.2), contain a cross-site request forgery vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to send arbitrary requests to the vulnerable application to perform server operations with the privileges of the authenticated victim user. | |||||
CVE-2019-18574 | 2 Emc, Rsa | 2 Rsa Authentication Manager, Authentication Manager | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
RSA Authentication Manager software versions prior to 8.4 P8 contain a stored cross-site scripting vulnerability in the Security Console. A malicious Security Console administrator could exploit this vulnerability to store arbitrary HTML or JavaScript code through the web interface which could then be included in a report. When other Security Console administrators open the affected report, the injected scripts could potentially be executed in their browser. | |||||
CVE-2019-3716 | 1 Rsa | 1 Archer Grc Platform | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks. | |||||
CVE-2019-3758 | 1 Rsa | 1 Archer | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts. | |||||
CVE-2019-3756 | 1 Rsa | 1 Archer | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions. | |||||
CVE-2019-3725 | 1 Rsa | 2 Netwitness, Security Analytics | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
RSA Netwitness Platform versions prior to 11.2.1.1 and RSA Security Analytics versions prior to 10.6.6.1 are vulnerable to a Command Injection vulnerability due to missing input validation in the product. A remote unauthenticated malicious user could exploit this vulnerability to execute arbitrary commands on the server. | |||||
CVE-2019-3724 | 1 Rsa | 2 Netwitness Platform, Security Analytics | 2024-02-04 | 4.0 MEDIUM | 8.8 HIGH |
RSA Netwitness Platform versions prior to 11.2.1.1 is vulnerable to an Authorization Bypass vulnerability. A remote low privileged attacker could potentially exploit this vulnerability to gain access to administrative information including credentials. | |||||
CVE-2019-3711 | 2 Emc, Rsa | 2 Rsa Authentication Manager, Authentication Manager | 2024-02-04 | 4.0 MEDIUM | 7.2 HIGH |
RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A malicious Operations Console administrator may be able to obtain the value of a domain password that another Operations Console administrator had set previously and use it for attacks. | |||||
CVE-2019-3715 | 1 Rsa | 1 Archer Grc Platform | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. | |||||
CVE-2018-11074 | 2 Emc, Rsa | 2 Rsa Authentication Manager, Authentication Manager | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
RSA Authentication Manager versions prior to 8.3 P3 are affected by a DOM-based cross-site scripting vulnerability which exists in its embedded MadCap Flare Help files. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or JavaScript code to the browser DOM, which code is then executed by the web browser in the context of the vulnerable web application. | |||||
CVE-2018-15782 | 1 Rsa | 1 Authentication Manager | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
The Quick Setup component of RSA Authentication Manager versions prior to 8.4 is vulnerable to a relative path traversal vulnerability. A local attacker could potentially provide an administrator with a crafted license that if used during the quick setup deployment of the initial RSA Authentication Manager system, could allow the attacker unauthorized access to that system. | |||||
CVE-2018-11060 | 1 Rsa | 1 Archer | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges. |