Show filters
20 Total Results
Displaying 11-20 of 20
Sort by:
Attacker Value
Unknown

CVE-2019-25012

Disclosure Date: January 01, 2021 (last updated November 28, 2024)
The Webform Report project 7.x-1.x-dev for Drupal allows remote attackers to view submissions by visiting the /rss.xml page. NOTE: This project is not covered by Drupal's security advisory policy.
Attacker Value
Unknown

CVE-2020-15884

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
A SQL injection vulnerability in TableQuery.php in MunkiReport before 5.6.3 allows attackers to execute arbitrary SQL commands via the order[0][dir] field on POST requests to /datatables/data.
Attacker Value
Unknown

CVE-2020-15885

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
A Cross-Site Scripting (XSS) vulnerability in the comment module before 4.0 for MunkiReport allows remote attackers to inject arbitrary web script or HTML by posting a new comment.
Attacker Value
Unknown

CVE-2020-15882

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
A CSRF issue in manager/delete_machine/{id} in MunkiReport before 5.6.3 allows attackers to delete arbitrary machines from the MunkiReport database.
Attacker Value
Unknown

CVE-2020-10190

Disclosure Date: March 09, 2020 (last updated February 21, 2025)
An issue was discovered in MunkiReport before 5.3.0. An authenticated user could achieve SQL Injection in app/models/tablequery.php by crafting a special payload on the /datatables/data endpoint.
Attacker Value
Unknown

CVE-2020-10191

Disclosure Date: March 09, 2020 (last updated February 21, 2025)
An issue was discovered in MunkiReport before 5.3.0. An authenticated actor can send a custom XSS payload through the /module/comment/save endpoint. The payload will be executed by any authenticated users browsing the application. This concerns app/controllers/client.php:detail.
Attacker Value
Unknown

CVE-2020-10192

Disclosure Date: March 09, 2020 (last updated February 21, 2025)
An issue was discovered in Munkireport before 5.3.0.3923. An unauthenticated actor can send a custom XSS payload through the /report/broken_client endpoint. The payload will be executed by any authenticated users browsing the application. This concerns app/views/listings/default.php.
Attacker Value
Unknown

CVE-2019-18932

Disclosure Date: July 06, 2019 (last updated February 21, 2025)
log.c in Squid Analysis Report Generator (sarg) through 2.3.11 allows local privilege escalation. By default, it uses a fixed temporary directory /tmp/sarg. As the root user, sarg creates this directory or reuses an existing one in an insecure manner. An attacker can pre-create the directory, and place symlinks in it (after winning a /tmp/sarg/denied.int_unsort race condition). The outcome will be corrupted or newly created files in privileged file system locations.
Attacker Value
Unknown

CVE-2014-0246

Disclosure Date: May 29, 2014 (last updated October 05, 2023)
SOSreport stores the md5 hash of the GRUB bootloader password in an archive, which allows local users to obtain sensitive information by reading the archive.
0
Attacker Value
Unknown

CVE-2012-5315

Disclosure Date: October 08, 2012 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in php ireport 1.0 allow remote attackers to inject arbitrary web script or HTML via the message parameter to (1) messages_viewer.php, (2) home.php, or (3) history.php.
0