Show filters
182 Total Results
Displaying 21-30 of 182
Sort by:
Attacker Value
Unknown
CVE-2023-48653
Disclosure Date: February 29, 2024 (last updated December 18, 2024)
Concrete CMS before 8.5.14 and 9 before 9.2.3 allows Cross Site Request Forgery (CSRF) via ccm/calendar/dialogs/event/delete/submit. An attacker can force an admin to delete events on the site because the event ID is numeric and sequential.
0
Attacker Value
Unknown
CVE-2023-48651
Disclosure Date: February 29, 2024 (last updated December 18, 2024)
Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) at /ccm/system/dialogs/file/delete/1/submit.
0
Attacker Value
Unknown
CVE-2023-48650
Disclosure Date: February 29, 2024 (last updated December 18, 2024)
Concrete CMS before 8.5.14 and 9 before 9.2.3 is vulnerable to an admin adding a stored XSS payload via the Layout Preset name.
0
Attacker Value
Unknown
CVE-2024-1246
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
Concrete CMS in version 9 before 9.2.5 is vulnerable to reflected XSS via the Image URL Import Feature due to insufficient validation of administrator provided data. A rogue administrator could inject malicious code when importing images, leading to the execution of the malicious code on the website user’s browser. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N. This does not affect Concrete versions prior to version 9.
0
Attacker Value
Unknown
CVE-2024-1245
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS in file tags and description attributes since administrator entered file attributes are not sufficiently sanitized in the Edit Attributes page. A rogue administrator could put malicious code into the file tags or description attributes and, when another administrator opens the same file for editing, the malicious code could execute. The Concrete CMS Security team scored this 2.4 with CVSS v3 vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N.
0
Attacker Value
Unknown
CVE-2024-1247
Disclosure Date: February 09, 2024 (last updated February 15, 2024)
Concrete CMS version 9 before 9.2.5 is vulnerable to stored XSS via the Role Name field since there is insufficient validation of administrator provided data for that field. A rogue administrator could inject malicious code into the Role Name field which might be executed when users visit the affected page. The Concrete CMS Security team scored this 2 with CVSS v3 vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator . Concrete versions below 9 do not include group types so they are not affected by this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47020
Disclosure Date: February 08, 2024 (last updated February 15, 2024)
Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.
0
Attacker Value
Unknown
CVE-2023-47022
Disclosure Date: February 06, 2024 (last updated February 14, 2024)
Insecure Direct Object Reference in NCR Terminal Handler v.1.5.1 allows an unprivileged user to edit the audit logs for any user and can lead to CSV injection.
0
Attacker Value
Unknown
CVE-2024-0914
Disclosure Date: January 31, 2024 (last updated April 25, 2024)
A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
0
Attacker Value
Unknown
CVE-2023-47024
Disclosure Date: January 20, 2024 (last updated February 10, 2024)
Cross-Site Request Forgery (CSRF) in NCR Terminal Handler v.1.5.1 leads to a one-click account takeover. This is achieved by exploiting multiple vulnerabilities, including an undisclosed function in the WSDL that has weak security controls and can accept custom content types.
0