Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gonicus gosa vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-11187
Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an malicious user to log into any account with a username containing the case-insensitive substring "success" when an arbitrary password is provided.
Gonicus Gosa
Debian Debian Linux 8.0
6.5
CVSSv3
CVE-2019-14466
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated malicious user to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unseria...
Gosa Project Gosa 2.7.5.2
Debian Debian Linux 8.0
6.1
CVSSv3
CVE-2018-1000528
GONICUS GOsa version before commit 56070d6289d47ba3f5918885954dcceb75606001 contains a Cross Site Scripting (XSS) vulnerability in change password form (html/password.php, #308) that can result in injection of arbitrary web script or HTML. This attack appear to be exploitable via...
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Gonicus Gosa -
NA
CVE-2007-0313
Unspecified vulnerability in GONICUS System Administration (GOsa) prior to 2.5.8 allows remote authenticated users to modify certain settings, including the admin password, via crafted POST requests.
Gonicus Gonicus System Administration
NA
CVE-2003-1412
PHP remote file inclusion vulnerability in index.php for GONiCUS System Administrator (GOsa) 1.0 allows remote malicious users to execute arbitrary PHP code via the plugin parameter to (1) 3fax/1blocklists/index.php; (2) 6departamentadmin/index.php, (3) 5terminals/index.php, (4) ...
Gonicus Gonicus System Administration 1.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started