CVE List

Id CVE No. Status Description Phase Votes Comments Actions
102039  CVE-2017-5219  Candidate  An issue was discovered in SageCRM 7.x before 7.3 SP3. The Component Manager functionality, provided by SageCRM, permits additional components to be added to the application to enhance provided functionality. This functionality allows a zip file to be uploaded, containing a valid .ecf component file, which will be extracted to the inf directory outside of the webroot. By creating a zip file containing an empty .ecf file, to pass file-validation checks, any other file provided in zip file will be extracted onto the filesystem. In this case, a web shell with the filename "..WWWRootCustomPagesaspshell.asp" was included within the zip file that, when extracted, traversed back out of the inf directory and into the SageCRM webroot. This permitted remote interaction with the underlying filesystem with the highest privilege level, SYSTEM.  Assigned (20170109)  None (candidate not yet proposed)    View
102040  CVE-2017-5220  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20170109)  None (candidate not yet proposed)    View
102041  CVE-2017-5221  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20170109)  None (candidate not yet proposed)    View
102042  CVE-2017-5222  Candidate  ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.  Assigned (20170109)  None (candidate not yet proposed)    View
102043  CVE-2017-5223  Candidate  An issue was discovered in PHPMailer before 5.2.22. PHPMailer"s msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.  Assigned (20170109)  None (candidate not yet proposed)    View

Page 19770 of 20943, showing 5 records out of 104715 total, starting on record 98846, ending on 98850

Actions