Lucene search

K
Easy Chat Server ProjectEasy Chat Server*

6 matches found

CVE
CVE
added 2023/10/04 1:15 p.m.63 views

CVE-2023-4491

Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine.

9.8CVSS9.8AI score0.00129EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.46 views

CVE-2023-4492

Vulnerability in Easy Address Book Web Server 1.6 version, affecting the parameters (firstname, homephone, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate and workzip) of the /addrbook.ghp file, allowing an attacker to inject a JavaScript payload specially designed to...

6.1CVSS6.2AI score0.00125EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.40 views

CVE-2023-4493

Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a r...

6.1CVSS5.5AI score0.00098EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.35 views

CVE-2023-4495

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp.

6.1CVSS5.9AI score0.00146EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.35 views

CVE-2023-4497

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Icon parameter. The XSS is loaded from /users.ghp.

6.1CVSS5.9AI score0.00146EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.34 views

CVE-2023-4496

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.

6.1CVSS6AI score0.00146EPSS