Filtered by vendor Accellion
Subscribe
Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-24110 | 1 Accellion | 1 Managed File Transfer | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Kiteworks MFT 7.5 may allow an unauthorized user to reset other users' passwords. This is fixed in version 7.6 and later. | |||||
CVE-2021-31586 | 1 Accellion | 1 Kiteworks | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Accellion Kiteworks before 7.4.0 allows an authenticated user to perform SQL Injection via LDAPGroup Search. | |||||
CVE-2021-31585 | 1 Accellion | 1 Kiteworks | 2024-11-21 | 4.6 MEDIUM | 6.7 MEDIUM |
Accellion Kiteworks before 7.3.1 allows a user with Admin privileges to escalate their privileges by generating SSH passwords that allow local access. | |||||
CVE-2021-27731 | 1 Accellion | 1 Fta | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Accellion FTA 9_12_432 and earlier is affected by stored XSS via a crafted POST request to a user endpoint. The fixed version is FTA_9_12_444 and later. | |||||
CVE-2021-27730 | 1 Accellion | 1 Fta | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Accellion FTA 9_12_432 and earlier is affected by argument injection via a crafted POST request to an admin endpoint. The fixed version is FTA_9_12_444 and later. | |||||
CVE-2021-27104 | 1 Accellion | 1 Fta | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
Accellion FTA 9_12_370 and earlier is affected by OS command execution via a crafted POST request to various admin endpoints. The fixed version is FTA_9_12_380 and later. | |||||
CVE-2021-27103 | 1 Accellion | 1 Fta | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later. | |||||
CVE-2021-27102 | 1 Accellion | 1 Fta | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. | |||||
CVE-2021-27101 | 1 Accellion | 1 Fta | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later. | |||||
CVE-2019-5623 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'). | |||||
CVE-2019-5622 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-798: Use of Hard-coded Credentials. | |||||
CVE-2017-9421 | 1 Accellion | 1 Kiteworks | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
Authentication Bypass vulnerability in Accellion kiteworks before 2017.01.00 allows remote attackers to execute certain API calls on behalf of a web user using a gathered token via a POST request to /oauth/token. | |||||
CVE-2017-8796 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because mysql_real_escape_string is misused, seos/courier/communication_p2p.php allows SQL injection with the app_id parameter. | |||||
CVE-2017-8795 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in home/seos/courier/smtpg_add.html with the param parameter. | |||||
CVE-2017-8794 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 6.4 MEDIUM | 10.0 CRITICAL |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. Because a regular expression (intended to match local https URLs) lacks an initial ^ character, courier/web/1000@/wmProgressval.html allows SSRF attacks with a file:///etc/passwd#https:// URL pattern. | |||||
CVE-2017-8793 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. By sending a POST request to home/seos/courier/web/wmProgressstat.html.php with an attacker domain in the acallow parameter, the device will respond with an Access-Control-Allow-Origin header allowing the attacker to have site access with a bypass of the Same Origin Policy. | |||||
CVE-2017-8792 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is XSS in home/seos/courier/user_add.html with the param parameter. | |||||
CVE-2017-8791 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. There is a home/seos/courier/login.html auth_params CRLF attack vector. | |||||
CVE-2017-8790 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. The home/seos/courier/ldaptest.html POST parameter "filter" can be used for LDAP Injection. | |||||
CVE-2017-8789 | 1 Accellion | 1 File Transfer Appliance | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on Accellion FTA devices before FTA_9_12_180. A report_error.php?year='payload SQL injection vector exists. |