Lucene search

K

6 matches found

CVE
CVE
added 2021/05/26 4:15 a.m.74 views

CVE-2021-29253

The Tableau integration in RSA Archer 6.4 P1 (6.4.0.1) through 6.9 P2 (6.9.0.2) is affected by an insecure credential storage vulnerability. An malicious attacker with access to the Tableau workbook file may obtain access to credential information to use it in further attacks.

5.5CVSS5.3AI score0.00103EPSS
CVE
CVE
added 2021/05/26 4:15 a.m.73 views

CVE-2021-29252

RSA Archer before 6.9 SP1 P1 (6.9.1.1) contains a stored XSS vulnerability. A remote authenticated malicious Archer user with access to modify link name fields could potentially exploit this vulnerability to execute code in a victim's browser.

5.4CVSS5.2AI score0.00262EPSS
CVE
CVE
added 2021/01/29 7:15 a.m.67 views

CVE-2020-29538

Archer before 6.9 P1 (6.9.0.1) contains an improper access control vulnerability in an API. A remote authenticated malicious administrative user can potentially exploit this vulnerability to gather information about the system, and may use this information in subsequent attacks.

4.9CVSS4.8AI score0.00228EPSS
CVE
CVE
added 2021/01/29 7:15 a.m.61 views

CVE-2020-29537

Archer before 6.8 P2 (6.8.0.2) is affected by an open redirect vulnerability. A remote privileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Arch...

5.4CVSS5.5AI score0.00112EPSS
CVE
CVE
added 2021/01/29 7:15 a.m.60 views

CVE-2020-29536

Archer before 6.8 P2 (6.8.0.2) is affected by a path exposure vulnerability. A remote authenticated malicious attacker with access to service files may obtain sensitive information to use it in further attacks.

4.3CVSS4.2AI score0.00072EPSS
CVE
CVE
added 2021/01/29 7:15 a.m.41 views

CVE-2020-29535

Archer before 6.8 P4 (6.8.0.4) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store throug...

5.4CVSS5AI score0.00222EPSS