Page 5 of 35 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 8EXPL: 0

WebAPP before 0.9.9.5 allows remote authenticated users, without admin privileges, to obtain sensitive information via (1) the Forum Archive feature and (2) Recent Searches. WebAPP anterior a 0.9.9.5 permite a usuarios validados, sin privilegios de administrador, obtener información sensible a través de la característica Forum Archive y (2) Busquedas recientes. • http://osvdb.org/33281 http://osvdb.org/33298 http://secunia.com/advisories/24080 http://www.securityfocus.com/bid/22563 http://www.vupen.com/english/advisories/2007/0604 http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=250 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

The (1) Search, (2) Edit Profile, (3) Recommend, and (4) User Approval forms in WebAPP before 0.9.9.5 use hidden inputs, which has unknown impact and remote attack vectors. Los formularios de (1) Search, (2) Edit de Perfil,(3) Recommend, y (4) User Approval en WebAPP anterior a 0.9.9.5 utilizan enrtadas oculta, lo cual tiene un impacto desconocido y vectores de ataque remotos. • http://osvdb.org/33295 http://secunia.com/advisories/24080 http://www.securityfocus.com/bid/22563 http://www.vupen.com/english/advisories/2007/0604 http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=250 •

CVSS: 5.8EPSS: 0%CPEs: 8EXPL: 0

WebAPP before 0.9.9.5 does not properly filter certain characters in contexts related to (1) the query string, (2) Profiles, (3) the Forum Post icon field, (4) the Edit Profile, and (5) the Gallery, which has unknown impact and remote attack vectors, possibly related to cross-site scripting (XSS). WebAPP anterior a 0.9.9.5 no filtra de forma adecuada ciertos caracteres en contextos relacionados en (1) la cadena query, (2)Profiles, (3)el icono del campo de Post del Forum, (4)el perfil de editor, y (5) Gallery, lo caul tiene un impacto desconocido y vectores de ataque remoto, posiblemente relacionado con secuencias de comandos en sitios cruzados (XSS). • http://osvdb.org/33277 http://osvdb.org/33283 http://osvdb.org/33286 http://osvdb.org/33287 http://secunia.com/advisories/24080 http://www.securityfocus.com/bid/22563 http://www.vupen.com/english/advisories/2007/0604 http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=250 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in WebAPP before 0.9.9.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) Gallery Comments pages, (2) Feedback pages, (3) Search Results pages, and (4) the Statistics Log viewer. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en WebAPP anterior a 0.9.9.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante vectores no especificados relacionados con (1) páginas de comentarios de galerías (Gallery Comments), (2) páginas de realimentación (Feedback), (3) páginas de búsqueda de resultados (Search Results), y (4) el visor del log de estadísticas (Statistics Log). • http://osvdb.org/33276 http://osvdb.org/33288 http://osvdb.org/33289 http://osvdb.org/33290 http://secunia.com/advisories/24080 http://www.securityfocus.com/bid/22563 http://www.vupen.com/english/advisories/2007/0604 http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=250 https://exchange.xforce.ibmcloud.com/vulnerabilities/32498 https://exchange.xforce.ibmcloud.com/vulnerabilities/32499 https://exchange.xforce.ibmcloud.com/vulnerabilities/32526 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in an admin feature in WebAPP before 20070209 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en una característica admin en WebAPP anterior a 20070209 permiet a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados. • http://osvdb.org/33275 http://www.securityfocus.com/bid/22563 http://www.vupen.com/english/advisories/2007/0604 http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=249 •