Lucene search

K

Bscw Security Vulnerabilities

cve
cve

CVE-2021-36359

OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3,.....

8.8CVSS

9AI Score

0.021EPSS

2021-08-30 05:15 AM
47
cve
cve

CVE-2021-39271

OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and...

8.8CVSS

8.7AI Score

0.011EPSS

2021-08-30 05:15 AM
59
cve
cve

CVE-2014-2301

OrbiTeam BSCW before 5.0.8 allows remote attackers to obtain sensitive metadata via the inf operations (op=inf) to an object in...

6.5AI Score

0.004EPSS

2014-05-12 02:55 PM
16
cve
cve

CVE-2002-0094

config_converters.py in BSCW (Basic Support for Cooperative Work) 3.x and versions before 4.06 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name during filename...

8.1AI Score

0.013EPSS

2003-04-02 05:00 AM
17
cve
cve

CVE-2002-0095

The default configuration of BSCW (Basic Support for Cooperative Work) 3.x and possibly version 4 enables user self registration, which could allow remote attackers to upload files and possibly join a user community that was intended to be...

7.2AI Score

0.02EPSS

2003-04-02 05:00 AM
27
cve
cve

CVE-2001-0973

BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag...

6.8AI Score

0.012EPSS

2002-03-09 05:00 AM
27