Filtered by vendor Frappe
Subscribe
Total
41 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-28598 | 1 Frappe | 1 Erpnext | 2023-04-06 | N/A | 6.1 MEDIUM |
Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. | |||||
CVE-2020-6145 | 1 Frappe | 1 Erpnext | 2022-05-12 | 6.5 MEDIUM | 8.8 HIGH |
An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | |||||
CVE-2019-20529 | 1 Frappe | 1 Frappe | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files. | |||||
CVE-2020-35175 | 1 Frappe | 1 Frappe | 2021-07-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API. | |||||
CVE-2020-27508 | 1 Frappe | 1 Frappe | 2020-12-14 | 5.0 MEDIUM | 7.5 HIGH |
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security. | |||||
CVE-2019-14965 | 1 Frappe | 1 Frappe | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists. | |||||
CVE-2019-20511 | 1 Frappe | 1 Erpnext | 2020-08-24 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows blog?blog_category= Frame Injection. | |||||
CVE-2019-20521 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI. | |||||
CVE-2019-20517 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the contact/ URI. | |||||
CVE-2019-20518 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI. | |||||
CVE-2019-20516 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the blog/ URI. | |||||
CVE-2019-20515 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the addresses/ URI. | |||||
CVE-2019-20519 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address. | |||||
CVE-2019-20520 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/method/ URI. | |||||
CVE-2019-20514 | 1 Frappe | 1 Erpnext | 2020-03-19 | 4.3 MEDIUM | 6.1 MEDIUM |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the address/ URI. | |||||
CVE-2019-15700 | 1 Frappe | 1 Frappe | 2019-09-04 | 4.3 MEDIUM | 6.1 MEDIUM |
public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text. | |||||
CVE-2019-14966 | 1 Frappe | 1 Frappe | 2019-08-16 | 6.5 MEDIUM | 8.8 HIGH |
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. There exists an authenticated SQL injection. | |||||
CVE-2019-14967 | 1 Frappe | 1 Frappe | 2019-08-15 | 4.3 MEDIUM | 6.1 MEDIUM |
An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability. | |||||
CVE-2018-20061 | 1 Frappe | 1 Erpnext | 2019-01-02 | 5.0 MEDIUM | 7.5 HIGH |
A SQL injection issue was discovered in ERPNext 10.x and 11.x through 11.0.3-beta.29. This attack is only available to a logged-in user; however, many ERPNext sites allow account creation via the web. No special privileges are needed to conduct the attack. By calling a JavaScript function that calls a server-side Python function with carefully chosen arguments, a SQL attack can be carried out which allows SQL queries to be constructed to return any columns from any tables in the database. This is related to /api/resource/Item?fields= URIs, frappe.get_list, and frappe.call. | |||||
CVE-2018-11339 | 1 Frappe | 1 Erpnext | 2018-06-26 | 4.3 MEDIUM | 6.1 MEDIUM |
An XSS issue was discovered in Frappe ERPNext v11.x.x-develop b1036e5 via a comment. |