Vulnerabilities (CVE)

Filtered by vendor Sawmill Subscribe
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-4947 1 Sawmill 1 Sawmill 2024-11-21 7.5 HIGH N/A
Unspecified vulnerability in the update and build database page in Sawmill before 8.6.3 allows remote attackers to have unknown impact and attack vectors.
CVE-2010-1079 1 Sawmill 1 Sawmill 2024-11-21 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Sawmill before 7.2.18 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2005-2950 1 Sawmill 1 Sawmill 2024-11-21 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Sawmill 7.0.0 through 7.1.13 allows remote attackers to inject arbitrary web script or HTML via the query string in an HTTP GET request.
CVE-2005-1901 1 Sawmill 1 Sawmill 2024-11-20 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page.
CVE-2005-1900 1 Sawmill 1 Sawmill 2024-11-20 7.5 HIGH N/A
Sawmill before 7.1.6 allows remote attackers to bypass authentication and (1) gain administrative privileges or (2) add a license.
CVE-2002-0265 1 Sawmill 1 Sawmill 2024-11-20 4.6 MEDIUM N/A
Sawmill for Solaris 6.2.14 and earlier creates the AdminPassword file with world-writable permissions, which allows local users to gain privileges by modifying the file.
CVE-2000-0589 1 Sawmill 1 Sawmill 2024-11-20 7.5 HIGH N/A
SawMill 5.0.21 uses weak encryption to store passwords, which allows attackers to easily decrypt the password and modify the SawMill configuration.
CVE-2000-0588 1 Sawmill 1 Sawmill 2024-11-20 5.0 MEDIUM N/A
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.
CVE-2017-5496 1 Sawmill 1 Sawmill 2024-02-04 5.0 MEDIUM 9.8 CRITICAL
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.