Show filters
73 Total Results
Displaying 41-50 of 73
Sort by:
Attacker Value
Unknown
CVE-2020-7358
Disclosure Date: September 18, 2020 (last updated February 22, 2025)
In AppSpider installer versions prior to 7.2.126, the AppSpider installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during an installation and any arbitrary code executable using the same file name.
0
Attacker Value
Unknown
CVE-2020-7382
Disclosure Date: September 03, 2020 (last updated February 22, 2025)
Rapid7 Nexpose installer version prior to 6.6.40 contains an Unquoted Search Path which may allow an attacker on the local machine to insert an arbitrary file into the executable path. This issue affects: Rapid7 Nexpose versions prior to 6.6.40.
0
Attacker Value
Unknown
CVE-2020-7381
Disclosure Date: September 03, 2020 (last updated February 22, 2025)
In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name.
0
Attacker Value
Unknown
CVE-2020-7376
Disclosure Date: August 24, 2020 (last updated February 22, 2025)
The Metasploit Framework module "post/osx/gather/enum_osx module" is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.
0
Attacker Value
Unknown
CVE-2020-7377
Disclosure Date: August 24, 2020 (last updated February 22, 2025)
The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.
0
Attacker Value
Unknown
CVE-2020-7354
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset.
0
Attacker Value
Unknown
CVE-2020-7355
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.
0
Attacker Value
Unknown
CVE-2012-6494
Disclosure Date: January 25, 2020 (last updated February 21, 2025)
Rapid7 Nexpose before 5.5.4 contains a session hijacking vulnerability which allows remote attackers to capture a user's session and gain unauthorized access.
0
Attacker Value
Unknown
Rapid7 AppSpider Chrome Plugin Insufficient Session Expiration
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
The Chrome Plugin for Rapid7 AppSpider can incorrectly keep browser sessions active after recording a macro, even after a restart of the Chrome browser. This behavior could make future session hijacking attempts easier, since the user could believe a session was closed when it was not. This issue affects Rapid7 AppSpider version 3.8.213 and prior versions, and is fixed in version 3.8.215.
0
Attacker Value
Unknown
CVE-2019-5645
Disclosure Date: October 09, 2019 (last updated February 22, 2025)
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
0