Beschreibung
Multiple serious vulnerabilities have been found in Groove products. Malicious users can exploit these vulnerabilities to obtain sensitive information, inject web scripts, bypass security restrictions and spoof filenames. Below is a complete list of vulnerabilities
- Improper file extension display can be exploited remotely via a specially designed filename;
- Vectors related to COM objects can be exploited remotely;
- XSS vulnerabilities in can be exploited remotely;
- Insecure permissions can be exploited locally.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2005-1678 critical
- CVE-2005-1677 critical
- CVE-2005-1676 critical
- CVE-2005-1675 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!