Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paperthin commonspot content server vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2014-2869
PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 allows remote malicious users to obtain sensitive information via requests to unspecified URIs, as demonstrated by pathname, SQL server, e-mail address, and IP address information.
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.1
Paperthin Commonspot Content Server 8.0.0
Paperthin Commonspot Content Server
5
CVSSv2
CVE-2014-2870
The default configuration of PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 uses cleartext for storage of credentials in a database, which makes it easier for context-dependent malicious users to obtain sensitive information via unspecified vectors.
Paperthin Commonspot Content Server 8.0.0
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.1
5
CVSSv2
CVE-2014-2871
PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 relies on an HTTP session for entering credentials on login pages, which allows remote malicious users to obtain sensitive information by sniffing the network.
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.1
Paperthin Commonspot Content Server 8.0.0
5
CVSSv2
CVE-2014-2872
PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 allows remote malicious users to obtain potentially sensitive information from a directory listing via unspecified vectors.
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 8.0.1
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.0
5
CVSSv2
CVE-2014-2873
PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 does not require authentication for access to log files, which allows remote malicious users to obtain sensitive server information by using a predictable name in a request for a file.
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.1
Paperthin Commonspot Content Server 8.0.0
10
CVSSv2
CVE-2014-2874
PaperThin CommonSpot prior to 7.0.2 and 8.x prior to 8.0.3 allows remote malicious users to execute arbitrary code via shell metacharacters in an unspecified context.
Paperthin Commonspot Content Server 8.0.2
Paperthin Commonspot Content Server 8.0.1
Paperthin Commonspot Content Server 8.0.0
Paperthin Commonspot Content Server
4.3
CVSSv2
CVE-2010-0468
Cross-site scripting (XSS) vulnerability in utilities/longproc.cfm in PaperThin CommonSpot Content Server allows remote malicious users to inject arbitrary web script or HTML via the url parameter.
Paperthin Commonspot Content Server -
1 EDB exploit
4.3
CVSSv2
CVE-2005-4574
Cross-site scripting (XSS) vulnerability in loader.cfm in PaperThin CommonSpot Content Server 4.5 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the bNewWindow parameter.
Paperthin Commonspot Content Server 2.5
Paperthin Commonspot Content Server 3.0
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 3.2
Paperthin Commonspot Content Server 4.0
1 EDB exploit
5
CVSSv2
CVE-2005-4575
PaperThin CommonSpot Content Server 4.5 and previous versions allow remote malicious users to obtain sensitive information via an invalid errmsg parameter to loader.cfm with a url parameter set to email-login-info.cfm, which leaks the full pathname in the resulting error message.
Paperthin Commonspot Content Server 3.2
Paperthin Commonspot Content Server 4.0
Paperthin Commonspot Content Server
Paperthin Commonspot Content Server 2.5
Paperthin Commonspot Content Server 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2