Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
orangescrum vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2023-0738
OrangeScrum version 2.0.11 allows an external malicious user to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Orangescrum Orangescrum 2.0.11
8.1
CVSSv3
CVE-2023-0454
OrangeScrum version 2.0.11 allows an authenticated external malicious user to delete arbitrary local files from the server. This is possible because the application uses an unsanitized attacker-controlled parameter to construct an internal path.
Orangescrum Orangescrum 2.0.11
8.8
CVSSv3
CVE-2023-0164
OrangeScrum version 2.0.11 allows an authenticated external malicious user to execute arbitrary commands on the server. This is possible because the application injects an attacker-controlled parameter into a system function.
Orangescrum Orangescrum 2.0.11
7.6
CVSSv3
CVE-2023-1783
OrangeScrum version 2.0.11 allows an external malicious user to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.
Orangescrum Orangescrum 2.0.11
6.1
CVSSv3
CVE-2023-0624
OrangeScrum version 2.0.11 allows an external malicious user to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Orangescrum Orangescrum 2.0.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started