Filtered by vendor Bscw
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-39271 | 1 Bscw | 1 Bscw Classic | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3. | |||||
CVE-2021-36359 | 1 Bscw | 1 Bscw Classic | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3. | |||||
CVE-2014-2301 | 1 Bscw | 1 Bscw | 2024-02-04 | 5.0 MEDIUM | N/A |
OrbiTeam BSCW before 5.0.8 allows remote attackers to obtain sensitive metadata via the inf operations (op=inf) to an object in pub/bscw.cgi/. |