2 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting. EGroupware anterior al 23.1.20240624 maneja mal una cláusula ORDER BY. • https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624 https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624 https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047 •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password. Se descubrió un problema en eGroupWare 17.1.20190111. Una vulnerabilidad de almacenamiento de contraseñas incorrectas afecta el panel de configuración en setup/manageheader.php, lo que permite a atacantes remotos autenticados con credenciales de administrador leer una contraseña de base de datos en texto plano. • https://www.gruppotim.it/it/footer/red-team.html • CWE-522: Insufficiently Protected Credentials •