Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2020-12478

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
Attacker Value
Unknown

CVE-2020-12477

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
Attacker Value
Unknown

CVE-2020-12479

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.
Attacker Value
Unknown

CVE-2019-17204

Disclosure Date: October 05, 2019 (last updated November 27, 2024)
TeamPass 2.1.27.36 allows Stored XSS by setting a crafted Knowledge Base label and adding any available item.
Attacker Value
Unknown

CVE-2019-17205

Disclosure Date: October 05, 2019 (last updated November 27, 2024)
TeamPass 2.1.27.36 allows Stored XSS by placing a payload in the username field during a login attempt. When an administrator looks at the log of failed logins, the XSS payload will be executed.
Attacker Value
Unknown

CVE-2019-17203

Disclosure Date: October 05, 2019 (last updated November 27, 2024)
TeamPass 2.1.27.36 allows Stored XSS at the Search page by setting a crafted password for an item in any folder.
Attacker Value
Unknown

CVE-2019-16904

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
TeamPass 2.1.27.36 allows Stored XSS by setting a crafted password for an item in a common available folder or sharing the item with an admin. (The crafted password is exploitable when viewing the change history of the item or tapping on the item.)