Filtered by vendor Sourcefabric
Subscriptions
Filtered by product Newscoop
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2013-0730 | 1 Sourcefabric | 1 Newscoop | 2024-09-17 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Newscoop 4.x through 4.1.0 allow remote attackers to inject arbitrary web script or HTML via vectors involving the (1) language parameter to application/modules/admin/controllers/LanguagesController.php or (2) user parameter to application/modules/admin/controllers/UserController.php. | ||||
CVE-2012-4679 | 1 Sourcefabric | 1 Newscoop | 2024-08-06 | N/A |
Cross-site scripting (XSS) vulnerability in admin/login.php in Newscoop before 3.5.5 allows remote attackers to inject arbitrary web script or HTML via the f_user_name parameter. | ||||
CVE-2012-1934 | 1 Sourcefabric | 1 Newscoop | 2024-08-06 | N/A |
SQL injection vulnerability in admin/country/edit.php in Newscoop before 3.5.5 and 4.x before 4 RC4 allows remote attackers to execute arbitrary SQL commands via the f_country_code parameter. | ||||
CVE-2012-1935 | 1 Sourcefabric | 1 Newscoop | 2024-08-06 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Newscoop 3.5.x before 3.5.5 and 4.x before 4 RC4 allow remote attackers to inject arbitrary web script or HTML via the (1) Back parameter to admin/ad.php, or the (2) token or (3) f_email parameter to admin/password_check_token.php. | ||||
CVE-2012-1933 | 1 Sourcefabric | 1 Newscoop | 2024-08-06 | N/A |
Multiple PHP remote file inclusion vulnerabilities in Newscoop 3.5.x before 3.5.5 and 4 before RC4, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[g_campsiteDir] parameter to (1) include/phorum_load.php, (2) conf/install_conf.php, or (3) conf/liveuser_configuration.php. | ||||
CVE-2020-11807 | 1 Sourcefabric | 1 Newscoop | 2024-08-04 | 7.8 High |
Because of Unrestricted Upload of a File with a Dangerous Type, Sourcefabric Newscoop 4.4.7 allows an authenticated user to execute arbitrary PHP code (and sometimes terminal commands) on a server by making an avatar update and then visiting the avatar file under the /images/ path. |
Page 1 of 1.