2 results (0.003 seconds)

CVSS: 4.0EPSS: 0%CPEs: 35EXPL: 0

phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value. phpCAS anterior a v1.1.2 permite a usuarios remotos autenticados secuestrar sesiones a través de una cadena de consulta que contiene un valor de ticket manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html http://secunia.com/advisories/40845 http://secunia.com/advisories/41240 http://secunia.com/advisories/42149 http://secunia.com/advisories/42184 http://secunia.com/advisories/43427& • CWE-20: Improper Input Validation •

CVSS: 2.6EPSS: 0%CPEs: 35EXPL: 0

Cross-site scripting (XSS) vulnerability in phpCAS before 1.1.2, when proxy mode is enabled, allows remote attackers to inject arbitrary web script or HTML via a callback URL. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en phpCAS anterior v1.1.2, cuando el modo proxy está habilitado, permite a atacantes remotos inyectar secuencias de comandos web o HTML a su elección a través de una URL de llamada. • http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html http://secunia.com/advisories/40845 http://secunia.com/advisories/41240 http://secunia.com/advisories/42149 http://secunia.com/advisories/42184 http://secunia.com/advisories/43427& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •