Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2021-41551
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Leostream Connection Broker 9.0.40.17 allows administrators to conduct directory traversal attacks by uploading z ZIP file that contains a symbolic link.
0
Attacker Value
Unknown
CVE-2021-41550
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Leostream Connection Broker 9.0.40.17 allows administrator to upload and execute Perl code.
0
Attacker Value
Unknown
CVE-2021-38157
Disclosure Date: August 06, 2021 (last updated February 23, 2025)
LeoStream Connection Broker 9.x before 9.0.34.3 allows Unauthenticated Reflected XSS via the /index.pl user parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2020-26574
Disclosure Date: October 06, 2020 (last updated February 22, 2025)
Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
0
Attacker Value
Unknown
CVE-2018-18817
Disclosure Date: October 30, 2018 (last updated November 27, 2024)
The Leostream Agent before Build 7.0.1.0 when used with Leostream Connection Broker 8.2.72 or earlier allows remote attackers to modify registry keys via the Leostream Agent API.
0