Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2021-39271
Disclosure Date: August 30, 2021 (last updated November 28, 2024)
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
0
Attacker Value
Unknown
CVE-2021-36359
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
0
Attacker Value
Unknown
CVE-2014-2301
Disclosure Date: May 12, 2014 (last updated October 05, 2023)
OrbiTeam BSCW before 5.0.8 allows remote attackers to obtain sensitive metadata via the inf operations (op=inf) to an object in pub/bscw.cgi/.
0
Attacker Value
Unknown
CVE-2002-0094
Disclosure Date: March 25, 2002 (last updated February 22, 2025)
config_converters.py in BSCW (Basic Support for Cooperative Work) 3.x and versions before 4.06 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name during filename conversion.
0
Attacker Value
Unknown
CVE-2002-0095
Disclosure Date: March 25, 2002 (last updated February 22, 2025)
The default configuration of BSCW (Basic Support for Cooperative Work) 3.x and possibly version 4 enables user self registration, which could allow remote attackers to upload files and possibly join a user community that was intended to be closed.
0
Attacker Value
Unknown
CVE-2001-0973
Disclosure Date: August 31, 2001 (last updated February 22, 2025)
BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space.
0