You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
13815,platforms/asp/webapps/13815.pl,"Netvolution CMS <= 2.x SQL Injection Exploit Script",2010-06-10,"amquen and krumel",asp,webapps,0
12135
12135
13816,platforms/php/webapps/13816.txt,"Miniweb 2.0 Business Portal and Social Networking Platform SQL Injection",2010-06-10,"L0rd CrusAd3r",php,webapps,0
32268,platforms/php/webapps/32268.txt,"Freeway 1.4.1.171 templates/Freeway/boxes/loginbox.php language Parameter Traversal Local File Inclusion",2008-08-18,"Digital Security Research Group",php,webapps,0
29047
29047
32269,platforms/php/webapps/32269.txt,"Freeway 1.4.1.171 templates/Freeway/boxes/whos_online.php language Parameter Traversal Local File Inclusion",2008-08-18,"Digital Security Research Group",php,webapps,0
29048
29048
32270,platforms/php/webapps/32270.txt,"Freeway 1.4.1.171 templates/Freeway/mainpage_modules/mainpage.php language Parameter Traversal Local File Inclusion",2008-08-18,"Digital Security Research Group",php,webapps,0
29049
+
32271,platforms/php/webapps/32271.txt,"NewsHOWLER 1.03 Cookie Data SQL Injection Vulnerability",2008-08-18,IRCRASH,php,webapps,0
NewsHOWLER is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4
+
5
+
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Ovidentia is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input data.
4
+
5
+
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
6
+
7
+
Ovidentia 6.6.5 is vulnerable; other versions may also be affected.
itMedia is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4
+
5
+
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
SeedDMS is the continuation of LetoDMS because it has lost its main developer. SeedDMS is an easy to use but powerful Open Source Document Management System.
4
+
http://www.seeddms.org/index.php?id=2
5
+
============
6
+
7
+
SeedDMS Unprivileged User Remote Code Execution Vulnerability (CVE-2014-2278):
8
+
============
9
+
Missing Function Level Access Controls: The application will allow file uploads of any type without sufficient user access controls.
10
+
11
+
Any unprivileged user, including guest users can upload arbitrary file types, including script formats that will allow remote code execution on the server.
12
+
13
+
Details:
14
+
----------------------
15
+
The /op/op.AddFile2.php upload function is not sufficiently access controlled. The script path can be controlled using the "fileId" parameter, which will allow an attacker to control the location of files to be uploaded to the system. Using path traversal a user can traverse out of the configured upload path, and insert arbitrary files into the web root.
16
+
17
+
The ?partitionIndex? parameter is used for filename/extension specification in the path.
18
+
19
+
The CVE project assigned CVE-2014-2278 to this issue.
0 commit comments