Filtered by vendor Ampache
Subscriptions
Filtered by product Ampache
Subscriptions
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-0771 | 1 Ampache | 1 Ampache | 2023-02-16 | 8.8 High |
SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop. | ||||
CVE-2023-0606 | 1 Ampache | 1 Ampache | 2023-02-07 | 6.1 Medium |
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7. | ||||
CVE-2022-4665 | 1 Ampache | 1 Ampache | 2022-12-30 | 8.8 High |
Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6. | ||||
CVE-2021-21399 | 1 Ampache | 1 Ampache | 2022-10-21 | 7.5 High |
Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory. | ||||
CVE-2021-32644 | 1 Ampache | 1 Ampache | 2021-06-29 | 5.4 Medium |
Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3. | ||||
CVE-2020-15153 | 1 Ampache | 1 Ampache | 2021-05-09 | 9.8 Critical |
Ampache before version 4.2.2 allows unauthenticated users to perform SQL injection. Refer to the referenced GitHub Security Advisory for details and a workaround. This is fixed in version 4.2.2 and the development branch. | ||||
CVE-2019-12386 | 1 Ampache | 1 Ampache | 2019-11-11 | N/A |
An issue was discovered in Ampache through 3.9.1. A stored XSS exists in the localplay.php LocalPlay "add instance" functionality. The injected code is reflected in the instances menu. This vulnerability can be abused to force an admin to create a new privileged user whose credentials are known by the attacker. | ||||
CVE-2019-12385 | 1 Ampache | 1 Ampache | 2019-11-11 | N/A |
An issue was discovered in Ampache through 3.9.1. The search engine is affected by a SQL Injection, so any user able to perform lib/class/search.class.php searches (even guest users) can dump any data contained in the database (sessions, hashed passwords, etc.). This may lead to a full compromise of admin accounts, when combined with the weak password generator algorithm used in the lostpassword functionality. | ||||
CVE-2017-18375 | 1 Ampache | 1 Ampache | 2019-05-30 | N/A |
Ampache 3.8.3 allows PHP Object Instantiation via democratic.ajax.php and democratic.class.php. | ||||
CVE-2008-3929 | 1 Ampache | 1 Ampache | 2017-08-08 | N/A |
gather-messages.sh in Ampache 3.4.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/filelist temporary file. | ||||
CVE-2007-4438 | 1 Ampache | 1 Ampache | 2017-07-29 | N/A |
Session fixation vulnerability in Ampache before 3.3.3.5 allows remote attackers to hijack web sessions via unspecified vectors. | ||||
CVE-2007-4437 | 1 Ampache | 1 Ampache | 2017-07-29 | N/A |
SQL injection vulnerability in albums.php in Ampache before 3.3.3.5 allows remote attackers to execute arbitrary SQL commands via the match parameter. NOTE: some details are obtained from third party information. | ||||
CVE-2006-5668 | 1 Ampache | 1 Ampache | 2017-07-20 | N/A |
Unspecified vulnerability in Ampache 3.3.2 and earlier, when register_globals is enabled, allows remote attackers to bypass security restrictions and gain guest access. |
Page 1 of 1.