Filtered by vendor Frappe
Subscribe
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-24812 | 1 Frappe | 1 Frappe | 2024-02-14 | N/A | 5.4 MEDIUM |
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. | |||||
CVE-2022-41712 | 1 Frappe | 1 Frappe | 2024-02-04 | N/A | 6.5 MEDIUM |
Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter. | |||||
CVE-2022-28598 | 1 Frappe | 1 Erpnext | 2024-02-04 | N/A | 6.1 MEDIUM |
Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. | |||||
CVE-2022-23056 | 1 Frappe | 1 Erpnext | 2024-02-04 | 3.5 LOW | N/A |
In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. | |||||
CVE-2022-23057 | 1 Frappe | 1 Erpnext | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile. | |||||
CVE-2022-23058 | 1 Frappe | 1 Erpnext | 2024-02-04 | 3.5 LOW | N/A |
ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. | |||||
CVE-2022-23055 | 1 Frappe | 1 Erpnext | 2024-02-04 | 5.5 MEDIUM | N/A |
In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users. | |||||
CVE-2020-35175 | 1 Frappe | 1 Frappe | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API. | |||||
CVE-2020-27508 | 1 Frappe | 1 Frappe | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security. | |||||
CVE-2019-20511 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows blog?blog_category= Frame Injection. | |||||
CVE-2019-20515 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI. | |||||
CVE-2019-20520 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/method/ URI. | |||||
CVE-2019-20516 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI. | |||||
CVE-2019-20517 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI. | |||||
CVE-2019-20518 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI. | |||||
CVE-2019-20529 | 1 Frappe | 1 Frappe | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files. | |||||
CVE-2020-6145 | 1 Frappe | 1 Erpnext | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | |||||
CVE-2019-20514 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI. | |||||
CVE-2019-20521 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI. | |||||
CVE-2019-20519 | 1 Frappe | 1 Erpnext | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address. |