gosa-project/gosa-core on GitHub
GOsa core
CVE History
CVE | Published | CVSS v2 | CVSS v3 |
---|---|---|---|
CVE-2019-14466 | 6.5 MEDIUM | 5.5 MEDIUM | |
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie. | |||
CVE-2018-1000528 | 6.1 MEDIUM | 4.3 MEDIUM | |
GONICUS GOsa version before commit 56070d6289d47ba3f5918885954dcceb75606001 contains a Cross Site Scripting (XSS) vulnerability in change password form (html/password.php, #308) that can result in injection of arbitrary web script or HTML. This attack appear to be exploitable via the victim must open a specially crafted web page. This vulnerability appears to have been fixed in after commit 56070d6289d47ba3f5918885954dcceb75606001. | |||
CVE-2014-9760 | 6.1 MEDIUM | 4.3 MEDIUM | |
Cross-site scripting (XSS) vulnerability in the displayLogin function in html/index.php in GOsa allows remote attackers to inject arbitrary web script or HTML via the username. | |||
CVE-2015-8771 | 9.8 CRITICAL | 7.5 HIGH | |
The generate_smb_nt_hash function in include/functions.inc in GOsa allows remote attackers to execute arbitrary commands via a crafted password. |