SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a path traversal vulnerability. User input passed through the "webhook_target_module" parameter is not properly sanitized before being used to save PHP code into the hooks file through the Web Logic Hooks module. This can be exploited to carry out path traversal attacks and e.g. create arbitrary directories. Successful exploitation of this vulnerability requires admin privileges.
f1a4888bc04dd7c2329d4b9e63f5dcf70134ff7d0aa19f7a98b29b2dbe0338e8
Debian Linux Security Advisory 4362-1 - Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service.
c252e299c25ae8af09e06a4f433bfb3b26ef49dcd4832c1492e04d926a4c55f2
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through the "trigger_event" parameter is not properly sanitized before being used to save PHP code into the 'logic_hooks.php' file through the Web Logic Hooks module. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.
373176d58b363fff344849e511f806e60ec800f851a6195367e4b5a93418a783
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'labels_' parameters is not properly sanitized before being used to save PHP code within the "ParserLabel::addLabels()" method when saving labels through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.
c7c33095fa6c3f0a02f90d6e98e9f06032661b1137f050544d06cb8446b39c1f
Oracle Application Express versions prior to 5.1.4.00.08 suffer from a cross site scripting vulnerability. The vulnerability is located in the OracleAnyChart.swf file. User input passed through the "__externalobjid" GET parameter is not properly sanitized before being passed to the "ExternalInterface.call" method.
fb135bb3e65032ece683796f6d00e171ccf703a496743031b7e8f5ac177dc40c
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a PHP code injection vulnerability in the WorkFlow module. User input passed through the $_POST['base_module'] parameter to the "Save" action of the WorkFlow module is not properly sanitized before being used to write data into the 'workflow.php' file. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.
c37dd37284e402ffed48fdd303aebe476fab7cb38a313fcbc305fbb02e290129
SugarCRM versions prior to 7.9.5.0, 8.0.2, and 8.2.0 suffer from a PHP code injection vulnerability. User input passed through key values of the 'list_value' JSON parameter is not properly sanitized before being used to save PHP code when adding/saving dropdowns through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.
980f9782786995d737ba7fd626d920010296ea4761e79aa483a82b1fe1b912d2
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a remote SQL injection vulnerability. The vulnerability is located within the SOAP API, specifically into the "portal_get_related_notes()" SOAP function. User input passed through the "order_by" parameter is not properly sanitized before being used to construct an "ORDER BY" clause of a SQL query from within the "get_notes_in_contacts()" or "get_notes_in_module()" functions. This can be exploited by Portal API Users to e.g. read sensitive data from the database through time-based SQL injection attacks.
8fd642b16f76870fd97e2aa38a1554554e8446dff1fee107a4b11985cc94644a
SugarCRM versions prior to 7.9.4.0 and 7.11.0.0 suffer from a server-side request forgery vulnerability. The vulnerability is located within the "ConnectorsController::action_CallRest()" method. User input passed through the "url" request parameter is not properly sanitized before being used in a call to the "file_get_contents" function.
73aea30f776890ef273c97076bc4e307c41eba6a7c8994f2355b433e4f8daccc
ForkCMS version 5.0.6 suffers from persistent cross site scripting vulnerabilities.
74316e9e30d37f77385e09fb5672e439c1fe1c37908d907876dc740b12574dd3
The GMP library uses asserts to crash a program at runtime when presented with data it did not anticipate. The library also ignores user requests to remove asserts using Posix's -DNDEBUG. Asserts are a debugging aide intended for development, and using them in production software ranges from questionable to insecure.
0ea40e7538d79e469e463d38a347c76e3de72e41c94a58fb82435611a73a68ac
Micro Focus Security Bulletin MFSBGN03838 1 - A potential security vulnerability has been identified in UCMDB. The vulnerability could be remotely exploited to Remote Directory Traversal and Remote Disclosure of Privileged Information. Revision 1 of this advisory.
aac434e3d2fe709c770f033ff7d24202e5628b92b79ded66afa79ccf4965ef2c
RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information.
333aa2865f86565a4167e421f942783dcaaa3ab27d3711f02029c0078efdda61
Voyager version 1.1.3 suffers from a remote shell upload vulnerability.
edea1199dcb26f94b9042baf87538bd89fb5e44dd3996e2736038e8033a9c68f
Gold Movies version 1.0.4 suffers from a cross site scripting vulnerability.
0d3b54741c6a714008aa9b17d73f43e29ec1f36616ea10f13dfa390b1f3a0af9