Filtered by vendor Open Source Development Network
Subscribe
Filtered by product Slashcode
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2000-1015 | 1 Open Source Development Network | 1 Slashcode | 2017-12-18 | 7.5 HIGH | N/A |
The default configuration of Slashcode before version 2.0 Alpha has a default administrative password, which allows remote attackers to gain Slashcode privileges and possibly execute arbitrary commands. | |||||
CVE-2004-2656 | 1 Open Source Development Network | 1 Slashcode | 2017-07-19 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) before R_2_5_0_41 allow remote attackers to inject arbitrary web script or HTML via (1) the topic parameter in search.pl and (2) the filter parameter in submit.pl. | |||||
CVE-2002-1681 | 1 Open Source Development Network | 1 Slashcode | 2017-07-10 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Slashcode CVS releases June 17 through July 1 2002 allows remote attackers to execute arbitrary script as other users by injecting script into the paragraph <P> tag. | |||||
CVE-2002-1748 | 1 Open Source Development Network | 1 Slashcode | 2017-07-10 | 7.2 HIGH | N/A |
Unknown vulnerability in Slash 2.1.x and 2.2 through 2.2.2, as used in Slashcode, allows remote authenticated users to gain access to arbitrary accounts. | |||||
CVE-2002-0292 | 1 Open Source Development Network | 1 Slashcode | 2016-10-17 | 2.6 LOW | N/A |
Cross-site scripting vulnerability in Slash before 2.2.5, as used in Slashcode and elsewhere, allows remote attackers to steal cookies and authentication information from other users via Javascript in a URL, possibly in the formkey field. | |||||
CVE-2001-1535 | 1 Open Source Development Network | 1 Slashcode | 2008-09-05 | 4.6 MEDIUM | N/A |
Slashcode 2.0 creates new accounts with an 8-character random password, which could allow local users to obtain session ID's from cookies and gain unauthorized access via a brute force attack. |