Atlassian

Agiloft

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 26.08.2025 22:19:20
  • Zuletzt bearbeitet 02.09.2025 17:59:05

Agiloft Release 28 contains an XML External Entities vulnerability in any table that allows 'import/export', allowing an authenticated attacker to import the template file and perform path traversal on the local system files. Users should upgrade to ...

  • EPSS 0.03%
  • Veröffentlicht 26.08.2025 22:18:30
  • Zuletzt bearbeitet 02.09.2025 17:57:25

Agiloft Release 28 downloads critical system packages over an insecure HTTP connection. An attacker in a Man-In-the-Middle position could replace or modify the contents of the download URL. Users should upgrade to Agiloft Release 30.

  • EPSS 0.05%
  • Veröffentlicht 26.08.2025 22:18:12
  • Zuletzt bearbeitet 02.09.2025 17:58:00

Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agilo...

  • EPSS 0.2%
  • Veröffentlicht 26.08.2025 22:17:50
  • Zuletzt bearbeitet 02.09.2025 17:58:53

Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.