Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-6723 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 9.8 CRITICAL |
An unrestricted file upload vulnerability has been identified in Repbox, which allows an attacker to upload malicious files via the transforamationfileupload function, due to the lack of proper file type validation controls, resulting in a full system compromise. | |||||
CVE-2023-6721 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 7.5 HIGH |
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system. | |||||
CVE-2023-6719 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 6.1 MEDIUM |
An XSS vulnerability has been detected in Repox, which allows an attacker to compromise interactions between a user and the vulnerable application, and can be exploited by a third party by sending a specially crafted JavaScript payload to a user, and thus gain full control of their session. | |||||
CVE-2023-6718 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 7.5 HIGH |
An authentication bypass vulnerability has been found in Repox, which allows a remote user to send a specially crafted POST request, due to the lack of any authentication method, resulting in the alteration or creation of users. | |||||
CVE-2023-6720 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 5.4 MEDIUM |
An XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads. | |||||
CVE-2023-6722 | 1 Europeana | 1 Repox | 2024-02-28 | N/A | 7.5 HIGH |
A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files... |