Search for packages
| purl | pkg:deb/debian/gosa@2.7.4%2Breloaded2-1%2Bdeb8u2 |
| Next non-vulnerable version | 2.7.4+reloaded3-16 |
| Latest non-vulnerable version | 2.7.4+reloaded3-16 |
| Risk | 2.8 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-33qd-24aq-1ffy
Aliases: CVE-2018-1000528 |
security update |
Affected by 3 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-fq7p-9rc3-xfdp
Aliases: CVE-2019-14466 |
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie. |
Affected by 0 other vulnerabilities. |
|
VCID-fw3k-qdyr-rbhw
Aliases: CVE-2015-8771 |
The generate_smb_nt_hash function in include/functions.inc in GOsa allows remote attackers to execute arbitrary commands via a crafted password. |
Affected by 3 other vulnerabilities. |
|
VCID-vppv-uve4-bqbx
Aliases: CVE-2019-11187 |
Incorrect Access Control in the LDAP class of GONICUS GOsa through 2019-04-11 allows an attacker to log into any account with a username containing the case-insensitive substring "success" when an arbitrary password is provided. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||