Show filters
501 Total Results
Displaying 251-260 of 501
Sort by:
Attacker Value
Unknown
CVE-2018-7201
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
0
Attacker Value
Unknown
CVE-2018-7202
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.
0
Attacker Value
Unknown
CVE-2019-11600
Disclosure Date: May 13, 2019 (last updated November 08, 2023)
A SQL injection vulnerability in the activities API in OpenProject before 8.3.2 allows a remote attacker to execute arbitrary SQL commands via the id parameter. The attack can be performed unauthenticated if OpenProject is configured not to require authentication for API access.
0
Attacker Value
Unknown
CVE-2015-1006
Disclosure Date: May 10, 2019 (last updated November 27, 2024)
A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible.
0
Attacker Value
Unknown
CVE-2019-11533
Disclosure Date: April 26, 2019 (last updated November 27, 2024)
Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.
0
Attacker Value
Unknown
CVE-2019-11492
Disclosure Date: April 26, 2019 (last updated November 27, 2024)
ProjectSend before r1070 writes user passwords to the server logs.
0
Attacker Value
Unknown
CVE-2019-2701
Disclosure Date: April 23, 2019 (last updated November 27, 2024)
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management component of Oracle Construction and Engineering Suite (subcomponent: Web Access). The supported version that is affected is 18.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
0
Attacker Value
Unknown
CVE-2019-11378
Disclosure Date: April 20, 2019 (last updated November 27, 2024)
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
0
Attacker Value
Unknown
CVE-2015-1007
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
A specially crafted configuration file could be used to cause a stack-based buffer overflow condition in the OPCTest.exe, which may allow remote code execution on Opto 22 PAC Project Professional versions prior to R9.4008, PAC Project Basic versions prior to R9.4008, PAC Display Basic versions prior to R9.4g, PAC Display Professional versions prior to R9.4g, OptoOPCServer version R9.4c and prior that were installed by PAC Project installer, versions prior to R9.4008, and OptoDataLink version R9.4d and prior that were installed by PAC Project installer, versions prior to R9.4008. Opto 22 suggests upgrading to the new product version as soon as possible.
0
Attacker Value
Unknown
CVE-2019-1003031
Disclosure Date: March 08, 2019 (last updated October 26, 2023)
A sandbox bypass vulnerability exists in Jenkins Matrix Project Plugin 1.13 and earlier in pom.xml, src/main/java/hudson/matrix/FilterScript.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM.
0