Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2010-2795

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-05 Aug, 2010 | 18:00
Updated At-07 Aug, 2024 | 02:46
Rejected At-
Credits

phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:05 Aug, 2010 | 18:00
Updated At:07 Aug, 2024 | 02:46
Rejected At:
▼CVE Numbering Authority (CNA)

phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2011/dsa-2172
vendor-advisory
x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0456
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/41240
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/40845
third-party-advisory
x_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
vendor-advisory
x_refsource_FEDORA
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
vdb-entry
x_refsource_XF
https://issues.jasig.org/browse/PHPCAS-61
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/2909
vdb-entry
x_refsource_VUPEN
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2010/2261
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/42149
third-party-advisory
x_refsource_SECUNIA
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/43427
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/42162
vdb-entry
x_refsource_BID
http://www.vupen.com/english/advisories/2010/2234
vdb-entry
x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
vendor-advisory
x_refsource_FEDORA
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/42184
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2011/dsa-2172
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vupen.com/english/advisories/2011/0456
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/41240
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/40845
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
Resource:
vdb-entry
x_refsource_XF
Hyperlink: https://issues.jasig.org/browse/PHPCAS-61
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2010/2909
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2010/2261
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/42149
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/12601
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/43427
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/42162
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.vupen.com/english/advisories/2010/2234
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/42184
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2011/dsa-2172
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vupen.com/english/advisories/2011/0456
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/41240
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/40845
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
vdb-entry
x_refsource_XF
x_transferred
https://issues.jasig.org/browse/PHPCAS-61
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2010/2909
vdb-entry
x_refsource_VUPEN
x_transferred
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2010/2261
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/42149
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/12601
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/43427
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/42162
vdb-entry
x_refsource_BID
x_transferred
http://www.vupen.com/english/advisories/2010/2234
vdb-entry
x_refsource_VUPEN
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/42184
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2011/dsa-2172
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2011/0456
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/41240
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/40845
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: https://issues.jasig.org/browse/PHPCAS-61
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/2909
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/2261
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/42149
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/12601
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/43427
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/42162
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2010/2234
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/42184
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Aug, 2010 | 18:17
Updated At:11 Apr, 2025 | 00:51

phpCAS before 1.1.2 allows remote authenticated users to hijack sessions via a query string containing a crafted ticket value.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N
CPE Matches

joachim_fritschi
joachim_fritschi
>>phpcas>>Versions up to 1.1.1(inclusive)
cpe:2.3:a:joachim_fritschi:phpcas:*:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.2
cpe:2.3:a:joachim_fritschi:phpcas:0.2:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.3
cpe:2.3:a:joachim_fritschi:phpcas:0.3:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.3.1
cpe:2.3:a:joachim_fritschi:phpcas:0.3.1:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.3.2
cpe:2.3:a:joachim_fritschi:phpcas:0.3.2:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4
cpe:2.3:a:joachim_fritschi:phpcas:0.4:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.1
cpe:2.3:a:joachim_fritschi:phpcas:0.4.1:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.2
cpe:2.3:a:joachim_fritschi:phpcas:0.4.2:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.3
cpe:2.3:a:joachim_fritschi:phpcas:0.4.3:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.4
cpe:2.3:a:joachim_fritschi:phpcas:0.4.4:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.5
cpe:2.3:a:joachim_fritschi:phpcas:0.4.5:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.6
cpe:2.3:a:joachim_fritschi:phpcas:0.4.6:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.7
cpe:2.3:a:joachim_fritschi:phpcas:0.4.7:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.8
cpe:2.3:a:joachim_fritschi:phpcas:0.4.8:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.9
cpe:2.3:a:joachim_fritschi:phpcas:0.4.9:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.10
cpe:2.3:a:joachim_fritschi:phpcas:0.4.10:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.11
cpe:2.3:a:joachim_fritschi:phpcas:0.4.11:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.12
cpe:2.3:a:joachim_fritschi:phpcas:0.4.12:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.13
cpe:2.3:a:joachim_fritschi:phpcas:0.4.13:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.14
cpe:2.3:a:joachim_fritschi:phpcas:0.4.14:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.15
cpe:2.3:a:joachim_fritschi:phpcas:0.4.15:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.16
cpe:2.3:a:joachim_fritschi:phpcas:0.4.16:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.17
cpe:2.3:a:joachim_fritschi:phpcas:0.4.17:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.18
cpe:2.3:a:joachim_fritschi:phpcas:0.4.18:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.19
cpe:2.3:a:joachim_fritschi:phpcas:0.4.19:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.20
cpe:2.3:a:joachim_fritschi:phpcas:0.4.20:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.21
cpe:2.3:a:joachim_fritschi:phpcas:0.4.21:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.22
cpe:2.3:a:joachim_fritschi:phpcas:0.4.22:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.4.23
cpe:2.3:a:joachim_fritschi:phpcas:0.4.23:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.5.0
cpe:2.3:a:joachim_fritschi:phpcas:0.5.0:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.5.1
cpe:2.3:a:joachim_fritschi:phpcas:0.5.1:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>0.6.0
cpe:2.3:a:joachim_fritschi:phpcas:0.6.0:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>1.0.0
cpe:2.3:a:joachim_fritschi:phpcas:1.0.0:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>1.0.1
cpe:2.3:a:joachim_fritschi:phpcas:1.0.1:*:*:*:*:*:*:*
joachim_fritschi
joachim_fritschi
>>phpcas>>1.1.0
cpe:2.3:a:joachim_fritschi:phpcas:1.1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/40845secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/41240secalert@redhat.com
N/A
http://secunia.com/advisories/42149secalert@redhat.com
N/A
http://secunia.com/advisories/42184secalert@redhat.com
N/A
http://secunia.com/advisories/43427secalert@redhat.com
N/A
http://www.debian.org/security/2011/dsa-2172secalert@redhat.com
N/A
http://www.securityfocus.com/bid/42162secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/2234secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/2261secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2010/2909secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0456secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894secalert@redhat.com
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/12601secalert@redhat.com
N/A
https://issues.jasig.org/browse/PHPCAS-61secalert@redhat.com
Patch
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLogsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/40845af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/41240af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42149af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42184af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/43427af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2011/dsa-2172af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/42162af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/2234af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/2261af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2010/2909af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0456af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/60894af854a3a-2127-422b-91ae-364da2661108
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/12601af854a3a-2127-422b-91ae-364da2661108
N/A
https://issues.jasig.org/browse/PHPCAS-61af854a3a-2127-422b-91ae-364da2661108
Patch
https://wiki.jasig.org/display/CASC/phpCAS+ChangeLogaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/40845
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/41240
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/42149
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/42184
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/43427
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.debian.org/security/2011/dsa-2172
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/42162
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2234
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2261
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2909
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0456
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/12601
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://issues.jasig.org/browse/PHPCAS-61
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046576.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-August/046584.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050415.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050428.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/40845
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/41240
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/42149
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/42184
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/43427
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2011/dsa-2172
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/42162
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2234
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2261
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2010/2909
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2011/0456
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/60894
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/12601
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://issues.jasig.org/browse/PHPCAS-61
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://wiki.jasig.org/display/CASC/phpCAS+ChangeLog
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

111Records found

CVE-2021-38455
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.3||HIGH
EPSS-0.20% / 42.37%
||
7 Day CHG~0.00%
Published-22 Oct, 2021 | 11:23
Updated-16 Sep, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AUVESY Versiondog

The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.

Action-Not Available
Vendor-auvesyAUVESY
Product-versiondogVersiondog
CWE ID-CWE-20
Improper Input Validation
CVE-2017-2653
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.40% / 59.56%
||
7 Day CHG~0.00%
Published-27 Jul, 2018 | 18:00
Updated-05 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. This attack would require additional cross-site scripting or similar attacks in order to execute.

Action-Not Available
Vendor-Red Hat, Inc.
Product-cloudforms_management_enginecloudformsCloudForms
CWE ID-CWE-20
Improper Input Validation
CVE-2017-18453
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.26% / 48.85%
||
7 Day CHG~0.00%
Published-02 Aug, 2019 | 16:26
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 64.0.21 does not preserve supplemental groups across account renames (SEC-260).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-18466
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.7||LOW
EPSS-0.26% / 48.85%
||
7 Day CHG~0.00%
Published-05 Aug, 2019 | 11:50
Updated-05 Aug, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 62.0.17 does not properly recognize domain ownership during addition of parked domains to a mail configuration (SEC-228).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-16594
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-6.5||MEDIUM
EPSS-5.53% / 89.88%
||
7 Day CHG~0.00%
Published-23 Jan, 2018 | 01:00
Updated-05 Aug, 2024 | 20:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to create arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.db.save_005fimage_jsp servlet, which listens on TCP port 8081 by default. When parsing the id parameter, the process does not properly validate user-supplied data, which can allow for the upload of files. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5117.

Action-Not Available
Vendor-netgain-systemsNetGain Systems
Product-enterprise_managerNetGain Systems Enterprise Manager
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CWE ID-CWE-20
Improper Input Validation
CVE-2017-15392
Matching Score-4
Assigner-Chrome
ShareView Details
Matching Score-4
Assigner-Chrome
CVSS Score-4.3||MEDIUM
EPSS-0.42% / 61.25%
||
7 Day CHG~0.00%
Published-07 Feb, 2018 | 23:00
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient data validation in V8 in Google Chrome prior to 62.0.3202.62 allowed an attacker who can write to the Windows Registry to potentially exploit heap corruption via a crafted Windows Registry entry, related to PlatformIntegration.

Action-Not Available
Vendor-n/aGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxGoogle Chrome prior to 62.0.3202.62
CWE ID-CWE-20
Improper Input Validation
CVE-2021-29770
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.13% / 33.72%
||
7 Day CHG~0.00%
Published-26 Jul, 2021 | 12:10
Updated-16 Sep, 2024 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow an authenticated user to perform unauthorized actions due to hazardous input validation. IBM X-Force ID: 202771.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-windowsi2_analyzelinux_kerneli2 Analyze
CWE ID-CWE-20
Improper Input Validation
CVE-2017-1555
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 44.08%
||
7 Day CHG~0.00%
Published-25 Sep, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM API Connect 5.0.0.0 through 5.0.7.2 could allow an authenticated user to generate an API token when not subscribed to the application plan. IBM X-Force ID: 131545.

Action-Not Available
Vendor-IBM Corporation
Product-api_connectAPI Connect
CWE ID-CWE-20
Improper Input Validation
CVE-2020-4151
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 33.72%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 15:10
Updated-17 Sep, 2024 | 02:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM QRadar SIEM 7.3.0 through 7.3.3 could allow an authenticated attacker to perform unauthorized actions due to improper input validation. IBM X-Force ID: 174201.

Action-Not Available
Vendor-IBM Corporation
Product-qradar_security_information_and_event_managerQRadar SIEM
CWE ID-CWE-20
Improper Input Validation
CVE-2020-4548
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.65%
||
7 Day CHG~0.00%
Published-20 Aug, 2020 | 15:55
Updated-16 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Content Navigator 3.0.7 and 3.0.8 is vulnerable to improper input validation. A malicious administrator could bypass the user interface and send requests to the IBM Content Navigator server with illegal characters that could be stored in the IBM Content Navigator database. IBM X-Force ID: 183316.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixwindowscontent_navigatorlinux_kernelContent Navigator
CWE ID-CWE-20
Improper Input Validation
CVE-2018-11044
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.91%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 19:00
Updated-16 Sep, 2024 | 21:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pivotal Apps Manager included in Pivotal Application Service, versions 2.2.x prior to 2.2.1 and 2.1.x prior to 2.1.8 and 2.0.x prior to 2.0.17 and 1.12.x prior to 1.12.26, does not escape all user-provided content when sending invitation emails. A malicious authenticated user can inject content into an invite to another user, exploiting the trust implied by the source of the email.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-pivotal_application_servicePivotal Application Service
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found