15 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

22 Oct 2024 — Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the title parameter with action=add or action=editform within the (a) managemessage.php file and (b) managetask.php file respectively. • https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

22 Oct 2024 — Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file. • https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

22 Oct 2024 — Collabtive 3.1 is vulnerable to Cross-Site Scripting (XSS) via the name parameter in (a) file tasklist.php under action = add/edit and in (b) file admin.php under action = adduser/edituser. • https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

29 Jan 2021 — Collabtive 3.1 allows XSS when an authenticated user enters an XSS payload into the address section of the profile edit page, aka the manageuser.php?action=edit address1 parameter. Collabtive versión 3.1, permite un ataque de tipo XSS cuando un usuario autenticado ingresa una carga útil de tipo XSS en la sección de dirección de la página de edición de perfil, también se conoce como el parámetro address1 de manageuser.php?action=edit • https://www.exploit-db.com/exploits/49468 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

31 Aug 2020 — An issue was discovered in Collabtive 3.0 and later. managefile.php is vulnerable to XSS: when the action parameter is set to movefile and the id parameter corresponds to a project the current user has access to, the file and target parameters are reflected. Se detectó un problema en Collabtive versiones 3.0 y posteriores. El archivo managefile.php es vulnerable a un ataque de tipo XSS: cuando el parámetro action se establece en movefile y el parámetro id corresponde a un proyecto al que el usuario actual t... • http://www.collabtive.o-dyn.de/blog • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

27 Dec 2019 — Collabtive 1.0 has incorrect access control Collabtive versión 1.0, tiene un control de acceso incorrecto. • https://www.immuniweb.com/advisory/HTB23169 • CWE-269: Improper Privilege Management •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

30 Jan 2019 — Collabtive 3.1 allows XSS via the manageuser.php?action=profile id parameter. La versión 3.1 de Collabtive permite Cross-Site Scripting (XSS) mediante el parámetro id en manageuser.php?action=profile. Collabtive version 3.1 suffers from a cross site scripting vulnerability. • https://packetstorm.news/files/id/151403 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 2

28 Sep 2015 — Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) .phtml extension. Múltiples vulnerabilidades de lista negra incompletas en la funcionalidad de carga de avatar en el archivo manageuser.php en Collabtive versiones anteriores a 2.1, permiten a los usuarios autenticados remotos ejecutar código arbitrario mediante... • https://packetstorm.news/files/id/133736 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 2

15 May 2014 — Cross-site scripting (XSS) vulnerability in Collabtive 1.2 allows remote authenticated users to inject arbitrary web script or HTML via the desc parameter in an Add project (addpro) action to admin.php. Vulnerabilidad de XSS en Collabtive 1.2 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro desc en una acción Add Project (addpro) hacia admin.php. • https://www.exploit-db.com/exploits/33250 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 4

08 May 2014 — SQL injection vulnerability in Collabtive 1.2 allows remote authenticated users to execute arbitrary SQL commands via the folder parameter in a fileview_list action to manageajax.php. Vulnerabilidad de inyección SQL en Collabtive 1.2 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro folder en una acción fileview_list hacia manageajax.php. Collabtive version 1.12 suffers from a remote SQL injection vulnerability. • https://packetstorm.news/files/id/126554 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •