5 results (0.009 seconds)

CVSS: 9.8EPSS: 2%CPEs: 16EXPL: 0

Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server. • https://umbraco.com/blog/security-advisory-20th-of-july-2021-patch-is-now-available https://umbraco.com/blog/security-advisory-security-patches-for-umbraco-forms-ready-on-july-20th-2021-at-7-am-utc •

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 4

The forms servlet (f90servlet) in Oracle Forms 4.5.10.22 allows remote attackers to cause a denial of service (TNS listener stop) via a userid parameter that contains a STOP command. • https://www.exploit-db.com/exploits/26336 http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0175.html http://marc.info/?l=bugtraq&m=112870645720399&w=2 http://secunia.com/advisories/15991 http://securityreason.com/securityalert/65 http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html http://www.red-database-security.com/advisory/oracle_forms_shutdown.html http://www.securityfocus.com/bid/15039 https://exchange.xforce.ibmcloud.com/vulnerabilities/22543 •

CVSS: 7.2EPSS: 7%CPEs: 7EXPL: 1

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet. Oracle Forms 4.5 hasta la 10g arranca desde ejecutables de directorios arbitrarios y los ejecuta como usuario Oracle o System, lo que permite que atacantes ejecuten código arbitrario usando un fichero .fmx malicioso y referenciándolo a través de un path absoluto en los parámetros "form" o "module" en f90servlet. • http://marc.info/?l=bugtraq&m=112180805413784&w=2 http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Oracle Forms 4.5, 6.0, 6i, and 9i on Unix, when a large number of records are retrieved by an Oracle form, stores a copy of the database tables in a world-readable temporary file, which allows local users to gain sensitive information such as credit card numbers. Oracle Forms 4.5, 6.0, 6i, y 9i en Unix, cuando un número elevado de filas son recuperadas por un formulario Oracle, almacena una copia de las tablas de la base de datos en un fichero legible por todo el mundo, lo que permite que usuarios locales obtengan información confidencial tal como números de tarjeta de crédito. • http://marc.info/?l=bugtraq&m=112129398711846&w=2 http://secunia.com/advisories/15991 http://www.oracle.com/technology/deploy/security/pdf/cpujul2005.html http://www.red-database-security.com/advisory/oracle_forms_unsecure_temp_file_handling.html https://exchange.xforce.ibmcloud.com/vulnerabilities/21347 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in Oracle Forms 10g allows remote attackers to execute arbitrary SQL commands via the Query/Where feature. • http://www.red-database-security.com/wp/sql_injection_forms_us.pdf http://www.securiteam.com/securitynews/5HP0I0UFFI.html https://exchange.xforce.ibmcloud.com/vulnerabilities/20080 •