Total
33 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-5333 | 1 Rsa | 1 Archer | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to view unauthorized information. | |||||
CVE-2020-5332 | 1 Rsa | 1 Archer | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability to execute arbitrary commands on the system where the vulnerable application is deployed. | |||||
CVE-2020-5331 | 1 Rsa | 1 Archer | 2024-11-21 | 2.1 LOW | 8.8 HIGH |
RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks. | |||||
CVE-2020-29538 | 1 Rsa | 1 Archer | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
Archer before 6.9 P1 (6.9.0.1) contains an improper access control vulnerability in an API. A remote authenticated malicious administrative user can potentially exploit this vulnerability to gather information about the system, and may use this information in subsequent attacks. | |||||
CVE-2020-29537 | 1 Rsa | 1 Archer | 2024-11-21 | 4.9 MEDIUM | 4.6 MEDIUM |
Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred. | |||||
CVE-2020-29536 | 1 Rsa | 1 Archer | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. A remote authenticated malicious attacker with access to service files may obtain sensitive information to use it in further attacks. | |||||
CVE-2020-29535 | 1 Rsa | 1 Archer | 2024-11-21 | 3.5 LOW | 5.3 MEDIUM |
Archer before 6.8 P4 (6.8.0.4) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. | |||||
CVE-2020-26884 | 1 Rsa | 1 Archer | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
RSA Archer 6.8 through 6.8.0.3 and 6.9 contains a URL injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability by tricking a victim application user into executing malicious JavaScript code in the context of the web application. | |||||
CVE-2019-3758 | 1 Rsa | 1 Archer | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts. | |||||
CVE-2019-3756 | 1 Rsa | 1 Archer | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions. | |||||
CVE-2018-11065 | 1 Rsa | 1 Archer | 2024-11-21 | 4.0 MEDIUM | 2.7 LOW |
The WorkPoint component, which is embedded in all RSA Archer, versions 6.1.x, 6.2.x, 6.3.x prior to 6.3.0.7 and 6.4.x prior to 6.4.0.1, contains a SQL injection vulnerability. A malicious user could potentially exploit this vulnerability to execute SQL commands on the back-end database to read certain data. Embedded WorkPoint is upgraded to version 4.10.16, which contains a fix for the vulnerability. | |||||
CVE-2018-11060 | 1 Rsa | 1 Archer | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges. | |||||
CVE-2018-11059 | 1 Rsa | 1 Archer | 2024-11-21 | 3.5 LOW | 8.2 HIGH |
RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. |