Vulnerabilities > Europeana
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-13 | CVE-2023-6723 | Unspecified vulnerability in Europeana Repox 2.3.7 An unrestricted file upload vulnerability has been identified in Repbox, which allows an attacker to upload malicious files via the transforamationfileupload function, due to the lack of proper file type validation controls, resulting in a full system compromise. | 9.8 |
2023-12-13 | CVE-2023-6719 | Unspecified vulnerability in Europeana Repox 2.3.7 An XSS vulnerability has been detected in Repox, which allows an attacker to compromise interactions between a user and the vulnerable application, and can be exploited by a third party by sending a specially crafted JavaScript payload to a user, and thus gain full control of their session. | 6.1 |
2023-12-13 | CVE-2023-6720 | Unspecified vulnerability in Europeana Repox 2.3.7 An XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads. | 5.4 |
2023-12-13 | CVE-2023-6721 | Unspecified vulnerability in Europeana Repox 2.3.7 An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system. | 7.5 |
2023-12-13 | CVE-2023-6722 | Unspecified vulnerability in Europeana Repox 2.3.7 A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. | 7.5 |
2023-12-13 | CVE-2023-6718 | Missing Authentication for Critical Function vulnerability in Europeana Repox 2.3.7 An authentication bypass vulnerability has been found in Repox, which allows a remote user to send a specially crafted POST request, due to the lack of any authentication method, resulting in the alteration or creation of users. | 7.5 |