Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

9 vulnerabilities found for slash by slashcode.com

CVE-2008-2231 (GCVE-0-2008-2231)

Vulnerability from nvd – Published: 2008-06-05 20:21 – Updated: 2024-08-07 08:49
VLAI?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2008-01-07 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:58.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
          },
          {
            "name": "31691",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31691"
          },
          {
            "name": "1020206",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020206"
          },
          {
            "name": "[oss-security] 20080604 Re: CVE id request: slash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
          },
          {
            "name": "[oss-security] 20080604 CVE id request: slash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
          },
          {
            "name": "slash-id-sql-injection(42880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
          },
          {
            "name": "3923",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3923"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
          },
          {
            "name": "DSA-1633",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1633"
          },
          {
            "name": "30551",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30551"
          },
          {
            "name": "29548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29548"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
        },
        {
          "name": "31691",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31691"
        },
        {
          "name": "1020206",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020206"
        },
        {
          "name": "[oss-security] 20080604 Re: CVE id request: slash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
        },
        {
          "name": "[oss-security] 20080604 CVE id request: slash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
        },
        {
          "name": "slash-id-sql-injection(42880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
        },
        {
          "name": "3923",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3923"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
        },
        {
          "name": "DSA-1633",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1633"
        },
        {
          "name": "30551",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30551"
        },
        {
          "name": "29548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
            },
            {
              "name": "31691",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31691"
            },
            {
              "name": "1020206",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020206"
            },
            {
              "name": "[oss-security] 20080604 Re: CVE id request: slash",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
            },
            {
              "name": "[oss-security] 20080604 CVE id request: slash",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
            },
            {
              "name": "slash-id-sql-injection(42880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
            },
            {
              "name": "3923",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3923"
            },
            {
              "name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
              "refsource": "CONFIRM",
              "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
            },
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
            },
            {
              "name": "DSA-1633",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1633"
            },
            {
              "name": "30551",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30551"
            },
            {
              "name": "29548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2231",
    "datePublished": "2008-06-05T20:21:00.000Z",
    "dateReserved": "2008-05-16T00:00:00.000Z",
    "dateUpdated": "2024-08-07T08:49:58.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2553 (GCVE-0-2008-2553)

Vulnerability from nvd – Published: 2008-06-05 20:21 – Updated: 2024-08-07 09:05
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2008-01-07 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:05:30.247Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
          },
          {
            "name": "slash-userfield-xss(42882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
          },
          {
            "name": "31691",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31691"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
          },
          {
            "name": "DSA-1633",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1633"
          },
          {
            "name": "1020207",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020207"
          },
          {
            "name": "30551",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30551"
          },
          {
            "name": "29548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29548"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
        },
        {
          "name": "slash-userfield-xss(42882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
        },
        {
          "name": "31691",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31691"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
        },
        {
          "name": "DSA-1633",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1633"
        },
        {
          "name": "1020207",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020207"
        },
        {
          "name": "30551",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30551"
        },
        {
          "name": "29548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2553",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
            },
            {
              "name": "slash-userfield-xss(42882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
            },
            {
              "name": "31691",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31691"
            },
            {
              "name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
              "refsource": "CONFIRM",
              "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
            },
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
            },
            {
              "name": "DSA-1633",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1633"
            },
            {
              "name": "1020207",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020207"
            },
            {
              "name": "30551",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30551"
            },
            {
              "name": "29548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2553",
    "datePublished": "2008-06-05T20:21:00.000Z",
    "dateReserved": "2008-06-05T00:00:00.000Z",
    "dateUpdated": "2024-08-07T09:05:30.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1647 (GCVE-0-2002-1647)

Vulnerability from nvd – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=103176636403241&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=103238514720237&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=103177860017930&w=2 mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/603945 third-party-advisoryx_refsource_CERT-VN
Date Public ?
2002-09-11 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.577Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020911 slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
          },
          {
            "name": "20020917 Re: slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
          },
          {
            "name": "20020911 Re: slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
          },
          {
            "name": "VU#603945",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/603945"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-09-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020911 slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
        },
        {
          "name": "20020917 Re: slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
        },
        {
          "name": "20020911 Re: slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
        },
        {
          "name": "VU#603945",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/603945"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1647",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020911 slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
            },
            {
              "name": "20020917 Re: slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
            },
            {
              "name": "20020911 Re: slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
            },
            {
              "name": "VU#603945",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/603945"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1647",
    "datePublished": "2005-03-28T05:00:00.000Z",
    "dateReserved": "2005-03-28T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:34:55.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2008-2553

Vulnerability from fkie_nvd - Published: 2008-06-05 20:32 - Updated: 2026-04-23 00:35
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
Impacted products
Vendor Product Version
slashcode.com slash *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A26183-2087-462B-BE7E-8BB15511B105",
              "versionEndIncluding": "r_2_5_0_94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en Slashdot Like Automated Storytelling Homepage (Slash) (Tambi\u00e9n conocido como Slashdot) R_2_5_0_94 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web de su elecci\u00f3n a trav\u00e9s del par\u00e1metro userfield."
    }
  ],
  "id": "CVE-2008-2553",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-06-05T20:32:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30551"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1633"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29548"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-2231

Vulnerability from fkie_nvd - Published: 2008-06-05 20:32 - Updated: 2026-04-23 00:35
Severity ?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499
cve@mitre.orghttp://marc.info/?l=oss-security&m=121258731028005&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=121260265427728&w=2
cve@mitre.orghttp://secunia.com/advisories/30551Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31691
cve@mitre.orghttp://securityreason.com/securityalert/3923
cve@mitre.orghttp://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&r2=1.225
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1633
cve@mitre.orghttp://www.securityfocus.com/bid/29548
cve@mitre.orghttp://www.securitytracker.com/id?1020206
cve@mitre.orghttp://www.slashcode.com/article.pl?sid=08/01/04/1950244&tid=4
cve@mitre.orghttp://www.slashcode.com/article.pl?sid=08/01/07/2314232
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/42880
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=121258731028005&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=121260265427728&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30551Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31691
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3923
af854a3a-2127-422b-91ae-364da2661108http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223&r2=1.225
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1633
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29548
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020206
af854a3a-2127-422b-91ae-364da2661108http://www.slashcode.com/article.pl?sid=08/01/04/1950244&tid=4
af854a3a-2127-422b-91ae-364da2661108http://www.slashcode.com/article.pl?sid=08/01/07/2314232
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/42880
Impacted products
Vendor Product Version
slashcode.com slash *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A26183-2087-462B-BE7E-8BB15511B105",
              "versionEndIncluding": "r_2_5_0_94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Slashdot Like Automated Storytelling Homepage (Slash) (Tambi\u00e9n conocido como Slashcode) R_2_5_0_94 y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n y leer informaci\u00f3n de las tablas a trav\u00e9s del par\u00e1metro id."
    }
  ],
  "id": "CVE-2008-2231",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-06-05T20:32:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30551"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3923"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1633"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29548"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020206"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3923"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2002-1647

Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2026-04-16 00:27
Severity ?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
Impacted products
Vendor Product Version
slashcode.com slash *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F03C1D89-8143-48C5-A07C-740072703D35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
    }
  ],
  "id": "CVE-2002-1647",
  "lastModified": "2026-04-16T00:27:16.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/603945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/603945"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2008-2231 (GCVE-0-2008-2231)

Vulnerability from cvelistv5 – Published: 2008-06-05 20:21 – Updated: 2024-08-07 08:49
VLAI?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2008-01-07 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:58.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
          },
          {
            "name": "31691",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31691"
          },
          {
            "name": "1020206",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020206"
          },
          {
            "name": "[oss-security] 20080604 Re: CVE id request: slash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
          },
          {
            "name": "[oss-security] 20080604 CVE id request: slash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
          },
          {
            "name": "slash-id-sql-injection(42880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
          },
          {
            "name": "3923",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3923"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
          },
          {
            "name": "DSA-1633",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1633"
          },
          {
            "name": "30551",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30551"
          },
          {
            "name": "29548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29548"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
        },
        {
          "name": "31691",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31691"
        },
        {
          "name": "1020206",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020206"
        },
        {
          "name": "[oss-security] 20080604 Re: CVE id request: slash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
        },
        {
          "name": "[oss-security] 20080604 CVE id request: slash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
        },
        {
          "name": "slash-id-sql-injection(42880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
        },
        {
          "name": "3923",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3923"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
        },
        {
          "name": "DSA-1633",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1633"
        },
        {
          "name": "30551",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30551"
        },
        {
          "name": "29548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
            },
            {
              "name": "31691",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31691"
            },
            {
              "name": "1020206",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020206"
            },
            {
              "name": "[oss-security] 20080604 Re: CVE id request: slash",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
            },
            {
              "name": "[oss-security] 20080604 CVE id request: slash",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
            },
            {
              "name": "slash-id-sql-injection(42880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
            },
            {
              "name": "3923",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3923"
            },
            {
              "name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
              "refsource": "CONFIRM",
              "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
            },
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
            },
            {
              "name": "DSA-1633",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1633"
            },
            {
              "name": "30551",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30551"
            },
            {
              "name": "29548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2231",
    "datePublished": "2008-06-05T20:21:00.000Z",
    "dateReserved": "2008-05-16T00:00:00.000Z",
    "dateUpdated": "2024-08-07T08:49:58.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2553 (GCVE-0-2008-2553)

Vulnerability from cvelistv5 – Published: 2008-06-05 20:21 – Updated: 2024-08-07 09:05
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2008-01-07 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:05:30.247Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
          },
          {
            "name": "slash-userfield-xss(42882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
          },
          {
            "name": "31691",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31691"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
          },
          {
            "name": "DSA-1633",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1633"
          },
          {
            "name": "1020207",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020207"
          },
          {
            "name": "30551",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30551"
          },
          {
            "name": "29548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29548"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
        },
        {
          "name": "slash-userfield-xss(42882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
        },
        {
          "name": "31691",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31691"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
        },
        {
          "name": "DSA-1633",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1633"
        },
        {
          "name": "1020207",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020207"
        },
        {
          "name": "30551",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30551"
        },
        {
          "name": "29548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29548"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2553",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
            },
            {
              "name": "slash-userfield-xss(42882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
            },
            {
              "name": "31691",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31691"
            },
            {
              "name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
              "refsource": "CONFIRM",
              "url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
            },
            {
              "name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
              "refsource": "CONFIRM",
              "url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
            },
            {
              "name": "DSA-1633",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1633"
            },
            {
              "name": "1020207",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020207"
            },
            {
              "name": "30551",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30551"
            },
            {
              "name": "29548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29548"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2553",
    "datePublished": "2008-06-05T20:21:00.000Z",
    "dateReserved": "2008-06-05T00:00:00.000Z",
    "dateUpdated": "2024-08-07T09:05:30.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1647 (GCVE-0-2002-1647)

Vulnerability from cvelistv5 – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=103176636403241&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=103238514720237&w=2 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=103177860017930&w=2 mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/603945 third-party-advisoryx_refsource_CERT-VN
Date Public ?
2002-09-11 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.577Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020911 slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
          },
          {
            "name": "20020917 Re: slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
          },
          {
            "name": "20020911 Re: slashdot / slashcode disclosing passwords",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
          },
          {
            "name": "VU#603945",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/603945"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-09-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020911 slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
        },
        {
          "name": "20020917 Re: slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
        },
        {
          "name": "20020911 Re: slashdot / slashcode disclosing passwords",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
        },
        {
          "name": "VU#603945",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/603945"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1647",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020911 slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
            },
            {
              "name": "20020917 Re: slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
            },
            {
              "name": "20020911 Re: slashdot / slashcode disclosing passwords",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
            },
            {
              "name": "VU#603945",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/603945"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1647",
    "datePublished": "2005-03-28T05:00:00.000Z",
    "dateReserved": "2005-03-28T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:34:55.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}