Filtered by vendor Frappe
Subscriptions
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-24812 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.4 Medium |
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. | ||||
CVE-2023-5555 | 1 Frappe | 1 Frappe Lms | 2024-11-21 | 6.1 Medium |
Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4. | ||||
CVE-2023-46127 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.4 Medium |
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0. | ||||
CVE-2023-42807 | 1 Frappe | 1 Frappe Lms | 2024-11-21 | 6.3 Medium |
Frappe LMS is an open source learning management system. In versions 1.0.0 and prior, on the People Page of LMS, there was an SQL Injection vulnerability. The issue has been fixed in the `main` branch. Users won't face this issue if they are using the latest main branch of the app. | ||||
CVE-2023-41328 | 1 Frappe | 1 Frappe | 2024-11-21 | 4.2 Medium |
Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There's no workaround to fix this without upgrading. | ||||
CVE-2022-41712 | 1 Frappe | 1 Frappe | 2024-11-21 | 6.5 Medium |
Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter. | ||||
CVE-2022-3988 | 1 Frappe | 1 Frappe | 2024-11-21 | 3.5 Low |
A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560. | ||||
CVE-2022-28598 | 1 Frappe | 1 Erpnext | 2024-11-21 | 6.1 Medium |
Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. | ||||
CVE-2022-23058 | 1 Frappe | 1 Erpnext | 2024-11-21 | N/A |
ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. | ||||
CVE-2022-23057 | 1 Frappe | 1 Erpnext | 2024-11-21 | 5.4 Medium |
In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile. | ||||
CVE-2022-23056 | 1 Frappe | 1 Erpnext | 2024-11-21 | N/A |
In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. | ||||
CVE-2022-23055 | 1 Frappe | 1 Erpnext | 2024-11-21 | N/A |
In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users. | ||||
CVE-2020-6145 | 1 Frappe | 1 Erpnext | 2024-11-21 | 8.8 High |
An SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | ||||
CVE-2020-35175 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.3 Medium |
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API. | ||||
CVE-2020-27508 | 1 Frappe | 1 Frappe | 2024-11-21 | 7.5 High |
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security. | ||||
CVE-2019-20529 | 1 Frappe | 1 Frappe | 2024-11-21 | 7.5 High |
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files. | ||||
CVE-2019-20521 | 1 Frappe | 1 Erpnext | 2024-11-21 | 6.1 Medium |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/ URI. | ||||
CVE-2019-20520 | 1 Frappe | 1 Erpnext | 2024-11-21 | 6.1 Medium |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the api/method/ URI. | ||||
CVE-2019-20519 | 1 Frappe | 1 Erpnext | 2024-11-21 | 6.1 Medium |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the user/ URI, as demonstrated by a crafted e-mail address. | ||||
CVE-2019-20518 | 1 Frappe | 1 Erpnext | 2024-11-21 | 6.1 Medium |
ERPNext 11.1.47 allows reflected XSS via the PATH_INFO to the project/ URI. |