Filtered by vendor Oneclickorgs
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2011-4553 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
Multiple open redirect vulnerabilities in One Click Orgs before 1.2.3 allow (1) remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the return_to parameter, and allow (2) remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via crafted characters in the domain name of a subdomain. | ||||
CVE-2011-4678 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
The password reset feature in One Click Orgs before 1.2.3 generates different error messages for failed reset attempts depending on whether the e-mail address is registered, which allows remote attackers to enumerate user accounts via a series of requests. | ||||
CVE-2011-4552 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in One Click Orgs before 1.2.3 allow remote attackers to inject arbitrary web script or HTML via the description field of (1) a new vote or (2) the eject member proposal feature. | ||||
CVE-2011-4554 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
One Click Orgs before 1.2.3 allows remote authenticated users to trigger crafted SMTP traffic via (1) " (double quote) and newline characters in an org name or (2) " (double quote) characters in an e-mail address, related to a "2nd Order SMTP Injection" issue. | ||||
CVE-2011-4555 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
One Click Orgs before 1.2.3 does not require unique e-mail addresses for user accounts, which allows remote authenticated users to cause a denial of service (login disruption) or spoof votes or comments by selecting a conflicting e-mail address. | ||||
CVE-2011-4677 | 1 Oneclickorgs | 1 One Click Orgs | 2022-10-03 | N/A |
One Click Orgs before 1.2.3 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. |
Page 1 of 1.