Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
High
CVE-2021-36798
Disclosure Date: August 09, 2021 (last updated November 28, 2024)
A Denial-of-Service (DoS) vulnerability was discovered in Team Server in HelpSystems Cobalt Strike 4.2 and 4.3. It allows remote attackers to crash the C2 server thread and block beacons' communication with it.
1
Attacker Value
Unknown
CVE-2022-42948
Disclosure Date: March 24, 2023 (last updated October 08, 2023)
Cobalt Strike 4.7.1 fails to properly escape HTML tags when they are displayed on Swing components. By injecting crafted HTML code, it is possible to remotely execute code in the Cobalt Strike UI.
0
Attacker Value
Unknown
CVE-2022-39197
Disclosure Date: September 22, 2022 (last updated October 08, 2023)
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
0
Attacker Value
Unknown
CVE-2021-46830
Disclosure Date: July 27, 2022 (last updated October 08, 2023)
A path traversal vulnerability exists within GoAnywhere MFT before 6.8.3 that utilize self-registration for the GoAnywhere Web Client. This vulnerability could potentially allow an external user who self-registers with a specific username and/or profile information to gain access to files at a higher directory level than intended.
0
Attacker Value
Unknown
CVE-2021-43708
Disclosure Date: April 21, 2022 (last updated October 07, 2023)
The Labeling tool in Titus Classification Suite 18.8.1910.140 allows users to avoid the generation of a classification label by using Excel's safe mode.
0
Attacker Value
Unknown
CVE-2022-23317
Disclosure Date: February 15, 2022 (last updated October 07, 2023)
CobaltStrike <=4.5 HTTP(S) listener does not determine whether the request URL begins with "/", and attackers can obtain relevant information by specifying the URL.
0
Attacker Value
Unknown
CVE-2018-20764
Disclosure Date: February 08, 2019 (last updated November 27, 2024)
A buffer overflow exists in HelpSystems tcpcrypt on Linux, used for BoKS encrypted telnet through BoKS version 6.7.1. Since tcpcrypt is setuid, exploitation leads to privilege escalation.
0