Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Open Source Development Network Subscribe
Filtered by product Slashcode
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-1015 1 Open Source Development Network 1 Slashcode 2017-12-18 7.5 HIGH N/A
The default configuration of Slashcode before version 2.0 Alpha has a default administrative password, which allows remote attackers to gain Slashcode privileges and possibly execute arbitrary commands.
CVE-2004-2656 1 Open Source Development Network 1 Slashcode 2017-07-19 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) before R_2_5_0_41 allow remote attackers to inject arbitrary web script or HTML via (1) the topic parameter in search.pl and (2) the filter parameter in submit.pl.
CVE-2002-1681 1 Open Source Development Network 1 Slashcode 2017-07-10 6.8 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Slashcode CVS releases June 17 through July 1 2002 allows remote attackers to execute arbitrary script as other users by injecting script into the paragraph <P> tag.
CVE-2002-1748 1 Open Source Development Network 1 Slashcode 2017-07-10 7.2 HIGH N/A
Unknown vulnerability in Slash 2.1.x and 2.2 through 2.2.2, as used in Slashcode, allows remote authenticated users to gain access to arbitrary accounts.
CVE-2002-0292 1 Open Source Development Network 1 Slashcode 2016-10-17 2.6 LOW N/A
Cross-site scripting vulnerability in Slash before 2.2.5, as used in Slashcode and elsewhere, allows remote attackers to steal cookies and authentication information from other users via Javascript in a URL, possibly in the formkey field.
CVE-2001-1535 1 Open Source Development Network 1 Slashcode 2008-09-05 4.6 MEDIUM N/A
Slashcode 2.0 creates new accounts with an 8-character random password, which could allow local users to obtain session ID's from cookies and gain unauthorized access via a brute force attack.