Articatech

Artica Proxy

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 29.31%
  • Veröffentlicht 21.03.2024 02:52:27
  • Zuletzt bearbeitet 17.06.2025 13:57:02

The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Prox...

Exploit
  • EPSS 85.08%
  • Veröffentlicht 21.03.2024 02:52:27
  • Zuletzt bearbeitet 17.06.2025 13:56:40

The Artica-Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user.

  • EPSS 5.43%
  • Veröffentlicht 05.03.2024 20:16:01
  • Zuletzt bearbeitet 21.11.2024 09:08:56

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening...

Exploit
  • EPSS 3.43%
  • Veröffentlicht 24.08.2022 13:15:08
  • Zuletzt bearbeitet 21.11.2024 07:14:31

An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php.

Exploit
  • EPSS 9.1%
  • Veröffentlicht 20.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy CE before 4.28.030.418. SQL Injection exists via the Netmask, Hostname, and Alias fields.

Exploit
  • EPSS 11.8%
  • Veröffentlicht 20.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy CE before 4.28.030.418. Reflected XSS exists via these search fields: real time request, System Events, Proxy Events, Proxy Objects, and Firewall objects.

Exploit
  • EPSS 25.84%
  • Veröffentlicht 15.07.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:42

An issue was discovered in Artica Proxy before 4.30.000000. Stored XSS exists via the Server Domain Name, Your Email Address, Group Name, MYSQL Server, Database, MYSQL Username, Group Name, and Task Description fields.

Exploit
  • EPSS 92.33%
  • Veröffentlicht 22.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:46

Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.

Exploit
  • EPSS 17.65%
  • Veröffentlicht 22.06.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:46

Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the Netbios name, Server domain name, dhclient_mac, Hostname, or Alias field. NOTE: this may overlap CVE-2020-10818.

Exploit
  • EPSS 7.56%
  • Veröffentlicht 22.03.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 04:56:08

Artica Proxy 4.26 allows remote command execution for an authenticated user via shell metacharacters in the "Modify the hostname" field.