Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
9 vulnerabilities found for slash by slashcode.com
CVE-2008-2231 (GCVE-0-2008-2231)
Vulnerability from nvd – Published: 2008-06-05 20:21 – Updated: 2024-08-07 08:49
VLAI?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
Date Public ?
2008-01-07 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:49:58.513Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3923"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3923"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2231",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3923"
},
{
"name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
"refsource": "CONFIRM",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29548"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2231",
"datePublished": "2008-06-05T20:21:00.000Z",
"dateReserved": "2008-05-16T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:49:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2553 (GCVE-0-2008-2553)
Vulnerability from nvd – Published: 2008-06-05 20:21 – Updated: 2024-08-07 09:05
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Date Public ?
2008-01-07 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:05:30.247Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31691"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31691"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2553",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31691"
},
{
"name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
"refsource": "CONFIRM",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29548"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2553",
"datePublished": "2008-06-05T20:21:00.000Z",
"dateReserved": "2008-06-05T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:05:30.247Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1647 (GCVE-0-2002-1647)
Vulnerability from nvd – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Date Public ?
2002-09-11 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:34:55.577Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-09-11T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/603945"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1647",
"datePublished": "2005-03-28T05:00:00.000Z",
"dateReserved": "2005-03-28T00:00:00.000Z",
"dateUpdated": "2024-08-08T03:34:55.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2008-2553
Vulnerability from fkie_nvd - Published: 2008-06-05 20:32 - Updated: 2026-04-23 00:35
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| slashcode.com | slash | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68A26183-2087-462B-BE7E-8BB15511B105",
"versionEndIncluding": "r_2_5_0_94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en Slashdot Like Automated Storytelling Homepage (Slash) (Tambi\u00e9n conocido como Slashdot) R_2_5_0_94 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web de su elecci\u00f3n a trav\u00e9s del par\u00e1metro userfield."
}
],
"id": "CVE-2008-2553",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-06-05T20:32:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30551"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31691"
},
{
"source": "cve@mitre.org",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29548"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020207"
},
{
"source": "cve@mitre.org",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"source": "cve@mitre.org",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31691"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-2231
Vulnerability from fkie_nvd - Published: 2008-06-05 20:32 - Updated: 2026-04-23 00:35
Severity ?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| slashcode.com | slash | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68A26183-2087-462B-BE7E-8BB15511B105",
"versionEndIncluding": "r_2_5_0_94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Slashdot Like Automated Storytelling Homepage (Slash) (Tambi\u00e9n conocido como Slashcode) R_2_5_0_94 y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n y leer informaci\u00f3n de las tablas a trav\u00e9s del par\u00e1metro id."
}
],
"id": "CVE-2008-2231",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-06-05T20:32:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30551"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31691"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/3923"
},
{
"source": "cve@mitre.org",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29548"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020206"
},
{
"source": "cve@mitre.org",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"source": "cve@mitre.org",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31691"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/3923"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29548"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-1647
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2026-04-16 00:27
Severity ?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| slashcode.com | slash | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slashcode.com:slash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F03C1D89-8143-48C5-A07C-740072703D35",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
}
],
"id": "CVE-2002-1647",
"lastModified": "2026-04-16T00:27:16.627",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2008-2231 (GCVE-0-2008-2231)
Vulnerability from cvelistv5 – Published: 2008-06-05 20:21 – Updated: 2024-08-07 08:49
VLAI?
Summary
SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
Date Public ?
2008-01-07 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:49:58.513Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/3923"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/3923"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2231",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to execute SQL commands and read table information via the id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "31691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31691"
},
{
"name": "1020206",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020206"
},
{
"name": "[oss-security] 20080604 Re: CVE id request: slash",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=121260265427728\u0026w=2"
},
{
"name": "[oss-security] 20080604 CVE id request: slash",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=121258731028005\u0026w=2"
},
{
"name": "slash-id-sql-injection(42880)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42880"
},
{
"name": "3923",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3923"
},
{
"name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
"refsource": "CONFIRM",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484499"
},
{
"name": "DSA-1633",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "30551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29548"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2231",
"datePublished": "2008-06-05T20:21:00.000Z",
"dateReserved": "2008-05-16T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:49:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2553 (GCVE-0-2008-2553)
Vulnerability from cvelistv5 – Published: 2008-06-05 20:21 – Updated: 2024-08-07 09:05
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Date Public ?
2008-01-07 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:05:30.247Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31691"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31691"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29548"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2553",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Slashdot Like Automated Storytelling Homepage (Slash) (aka Slashcode) R_2_5_0_94 and earlier allows remote attackers to inject arbitrary web script or HTML via the userfield parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/07/2314232"
},
{
"name": "slash-userfield-xss(42882)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42882"
},
{
"name": "31691",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31691"
},
{
"name": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225",
"refsource": "CONFIRM",
"url": "http://slashcode.cvs.sourceforge.net/slashcode/slash/Slash/Utility/Environment/Environment.pm?r1=1.223\u0026r2=1.225"
},
{
"name": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4",
"refsource": "CONFIRM",
"url": "http://www.slashcode.com/article.pl?sid=08/01/04/1950244\u0026tid=4"
},
{
"name": "DSA-1633",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1633"
},
{
"name": "1020207",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020207"
},
{
"name": "30551",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30551"
},
{
"name": "29548",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29548"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2553",
"datePublished": "2008-06-05T20:21:00.000Z",
"dateReserved": "2008-06-05T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:05:30.247Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1647 (GCVE-0-2002-1647)
Vulnerability from cvelistv5 – Published: 2005-03-28 05:00 – Updated: 2024-08-08 03:34
VLAI?
Summary
The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Date Public ?
2002-09-11 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:34:55.577Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-09-11T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/603945"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The quick login feature in Slash Slashcode does not redirect the user to an alternate URL when the wrong password is provided, which makes it easier for remote web sites to guess the proper passwords by reading the username and password from the Referrer URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020911 slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103176636403241\u0026w=2"
},
{
"name": "20020917 Re: slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103238514720237\u0026w=2"
},
{
"name": "20020911 Re: slashdot / slashcode disclosing passwords",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=103177860017930\u0026w=2"
},
{
"name": "VU#603945",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/603945"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1647",
"datePublished": "2005-03-28T05:00:00.000Z",
"dateReserved": "2005-03-28T00:00:00.000Z",
"dateUpdated": "2024-08-08T03:34:55.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}