Filtered by vendor Terminalfour
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-29484 | 1 Terminalfour | 1 Terminalfour | 2024-11-21 | 6.5 Medium |
In Terminalfour before 8.3.16, misconfigured LDAP users are able to login with an invalid password. | ||||
CVE-2023-23591 | 1 Terminalfour | 1 Terminalfour | 2024-11-21 | 4.9 Medium |
The Logback component in Terminalfour before 8.3.14.1 allows OS administrators to obtain sensitive information from application server logs when debug logging is enabled. The fixed versions are 8.2.18.7, 8.2.18.2.2, 8.3.11.1, and 8.3.14.1. | ||||
CVE-2022-30770 | 1 Terminalfour | 1 Terminalfour | 2024-11-21 | 6.1 Medium |
Terminalfour versions 8.3.7, 8.3.x versions prior to version 8.3.8 and r 8.2.x versions prior to version 8.2.18.5 or 8.2.18.2.1 are vulnerable to (XSS) vulnerability that could be exploited by an attacker to mislead an administrator and steal their credentials. | ||||
CVE-2024-22217 | 1 Terminalfour | 1 Terminalfour | 2024-09-11 | 6.5 Medium |
A Server-Side Request Forgery (SSRF) vulnerability in Terminalfour before 8.3.19 allows authenticated users to use specific features to access internal services including sensitive information on the server that Terminalfour runs on. | ||||
CVE-2024-22219 | 1 Terminalfour | 2 Terminalfour, Xml Jdbc | 2024-08-19 | 6.3 Medium |
XML External Entity (XXE) vulnerability in Terminalfour 8.0.0001 through 8.3.18 and XML JDBC versions up to 1.0.4 allows authenticated users to submit malicious XML via unspecified features which could lead to various actions such as accessing the underlying server, remote code execution (RCE), or performing Server-Side Request Forgery (SSRF) attacks. | ||||
CVE-2024-22218 | 1 Terminalfour | 2 Terminalfour, Xml Jdbc | 2024-08-19 | 8.8 High |
XML External Entity (XXE) vulnerability in Terminalfour 8.0.0001 through 8.3.18 and XML JDBC versions up to 1.0.4 allows authenticated users to submit malicious XML via unspecified features which could lead to various actions such as accessing the underlying server, remote code execution (RCE), or performing Server-Side Request Forgery (SSRF) attacks. |
Page 1 of 1.