Vulnerabilities (CVE)

Filtered by vendor Limesurvey Subscribe
Filtered by product Limesurvey
Total 68 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-16185 1 Limesurvey 1 Limesurvey 2019-09-10 6.5 MEDIUM 7.2 HIGH
In Limesurvey before 3.17.14, admin users can view, update, or delete reserved menu entries without proper permissions.
CVE-2019-16186 1 Limesurvey 1 Limesurvey 2019-09-10 6.5 MEDIUM 7.2 HIGH
In Limesurvey before 3.17.14, admin users can access the plugin manager without proper permissions.
CVE-2019-16182 1 Limesurvey 1 Limesurvey 2019-09-10 4.3 MEDIUM 6.1 MEDIUM
A reflected cross-site scripting (XSS) vulnerability was found in Limesurvey before 3.17.14 that allows remote attackers to inject arbitrary web script or HTML via extensions of uploaded files.
CVE-2019-16178 1 Limesurvey 1 Limesurvey 2019-09-10 3.5 LOW 5.4 MEDIUM
A stored cross-site scripting (XSS) vulnerability was found in Limesurvey before 3.17.14 that allows authenticated users with correct permissions to inject arbitrary web script or HTML via titles of admin box buttons on the home page.
CVE-2019-15640 1 Limesurvey 1 Limesurvey 2019-09-03 5.0 MEDIUM 7.5 HIGH
Limesurvey before 3.17.10 does not validate both the MIME type and file extension of an image.
CVE-2018-17057 2 Limesurvey, Tecnick 2 Limesurvey, Tcpdf 2019-04-26 7.5 HIGH 9.8 CRITICAL
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
CVE-2018-20322 1 Limesurvey 1 Limesurvey 2019-03-18 4.3 MEDIUM 6.1 MEDIUM
LimeSurvey version 3.15.5 contains a Cross-site scripting (XSS) vulnerability in Survey Resource zip upload, resulting in Javascript code execution against LimeSurvey administrators. Fixed in version 3.15.6.
CVE-2017-18358 1 Limesurvey 1 Limesurvey 2019-01-24 4.3 MEDIUM 6.1 MEDIUM
LimeSurvey before 2.72.4 has Stored XSS by using the Continue Later (aka Resume later) feature to enter an email address, which is mishandled in the admin panel.
CVE-2018-17003 1 Limesurvey 1 Limesurvey 2018-11-09 4.3 MEDIUM 6.1 MEDIUM
In LimeSurvey 3.14.7, HTML Injection and Stored XSS have been discovered in the appendix via the surveyls_title parameter to /index.php?r=admin/survey/sa/insert.
CVE-2018-16397 1 Limesurvey 1 Limesurvey 2018-10-31 4.0 MEDIUM 4.9 MEDIUM
In LimeSurvey before 3.14.7, an admin user can leverage a "file upload" question to read an arbitrary file,
CVE-2018-1000659 1 Limesurvey 1 Limesurvey 2018-10-26 6.5 MEDIUM 8.8 HIGH
LimeSurvey version 3.14.4 and earlier contains a directory traversal in file upload that allows upload of webshell vulnerability in file upload functionality that can result in remote code execution as authenticated user. This attack appear to be exploitable via An authenticated user can upload a specially crafted zip file to get remote code execution. This vulnerability appears to have been fixed in after commit 72a02ebaaf95a80e26127ee7ee2b123cccce05a7 / version 3.14.4.
CVE-2018-1000658 1 Limesurvey 1 Limesurvey 2018-10-26 6.5 MEDIUM 8.8 HIGH
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4.
CVE-2018-1000513 1 Limesurvey 1 Limesurvey 2018-08-21 3.5 LOW 4.8 MEDIUM
LimeSurvey version 3.0.0-beta.3+17110 contains a Cross Site Scripting (XSS) vulnerability in Boxes that can result in JS code execution against LimeSurvey admins. This vulnerability appears to have been fixed in 3.6.x.
CVE-2018-1000514 1 Limesurvey 1 Limesurvey 2018-08-20 4.3 MEDIUM 4.3 MEDIUM
LimeSurvey version 3.0.0-beta.3+17110 contains a Cross ite Request Forgery (CSRF) vulnerability in Boxes that can result in CSRF admins to delete boxes. This vulnerability appears to have been fixed in 3.6.x.
CVE-2018-7556 2 Debian, Limesurvey 2 Debian Linux, Limesurvey 2018-03-23 6.4 MEDIUM 9.1 CRITICAL
LimeSurvey 2.6.x before 2.6.7, 2.7x.x before 2.73.1, and 3.x before 3.4.2 mishandles application/controller/InstallerController.php after installation, which allows remote attackers to access the configuration file.
CVE-2018-1000053 1 Limesurvey 1 Limesurvey 2018-03-08 6.8 MEDIUM 8.8 HIGH
LimeSurvey version 3.0.0-beta.3+17110 contains a Cross ite Request Forgery (CSRF) vulnerability in Theme Uninstallation that can result in CSRF causing LimeSurvey admins to delete all their themes, rendering the website unusable. This attack appear to be exploitable via Simple HTML markup can be used to send a GET request to the affected endpoint.
CVE-2007-3632 1 Limesurvey 1 Limesurvey 2017-09-29 6.8 MEDIUM N/A
Multiple PHP remote file inclusion vulnerabilities in LimeSurvey (aka PHPSurveyor) 1.49RC2 allow remote attackers to execute arbitrary PHP code via a URL in the homedir parameter to (1) OLE/PPS/File.php, (2) OLE/PPS/Root.php, (3) Spreadsheet/Excel/Writer.php, or (4) OLE/PPS.php in admin/classes/pear/; or (5) Worksheet.php, (6) Parser.php, (7) Workbook.php, (8) Format.php, or (9) BIFFwriter.php in admin/classes/pear/Spreadsheet/Excel/Writer/.
CVE-2007-5573 1 Limesurvey 1 Limesurvey 2017-09-29 6.8 MEDIUM N/A
PHP remote file inclusion vulnerability in classes/core/language.php in LimeSurvey 1.5.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootdir parameter.
CVE-2012-4994 1 Limesurvey 1 Limesurvey 2017-08-29 6.5 MEDIUM N/A
SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information.
CVE-2012-4995 1 Limesurvey 1 Limesurvey 2017-08-29 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in admin/userrighthandling.php in LimeSurvey before 1.91+ Build 120224 allows remote attackers to inject arbitrary web script or HTML via the full_name parameter in a moduser action to admin/admin.php. NOTE: some of these details are obtained from third party information.