Filtered by vendor Pwndoc Project
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-45771 | 1 Pwndoc Project | 1 Pwndoc | 2024-11-21 | N/A | 8.8 HIGH |
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file. | |||||
CVE-2022-44023 | 1 Pwndoc Project | 1 Pwndoc | 2024-11-21 | N/A | 5.3 MEDIUM |
PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response messages for authentication attempts. | |||||
CVE-2022-44022 | 1 Pwndoc Project | 1 Pwndoc | 2024-11-21 | N/A | 5.3 MEDIUM |
PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts. | |||||
CVE-2021-31590 | 1 Pwndoc Project | 1 Pwndoc | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
PwnDoc all versions until 0.4.0 (2021-08-23) has incorrect JSON Webtoken handling, leading to incorrect access control. With a valid JSON Webtoken that is used for authentication and authorization, a user can keep his admin privileges even if he is downgraded to the "user" privilege. Even after a user's account is deleted, the user can still access the administration panel (and add or delete users) and has complete access to the system. |