Filtered by vendor Frappe
Subscriptions
Filtered by product Frappe
Subscriptions
Total
31 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-3988 | 1 Frappe | 1 Frappe | 2025-04-15 | 3.5 Low |
A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560. | ||||
CVE-2024-24812 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.4 Medium |
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and a tightly integrated client side library. Prior to versions 14.59.0 and 15.5.0, portal pages are susceptible to Cross-Site Scripting (XSS) which can be used to inject malicious JS code if user clicks on a malicious link. This vulnerability has been patched in versions 14.59.0 and 15.5.0. No known workarounds are available. | ||||
CVE-2023-46127 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.4 Medium |
Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0. | ||||
CVE-2023-41328 | 1 Frappe | 1 Frappe | 2024-11-21 | 4.2 Medium |
Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There's no workaround to fix this without upgrading. | ||||
CVE-2020-35175 | 1 Frappe | 1 Frappe | 2024-11-21 | 5.3 Medium |
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API. | ||||
CVE-2020-27508 | 1 Frappe | 1 Frappe | 2024-11-21 | 7.5 High |
In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security. | ||||
CVE-2019-20529 | 1 Frappe | 1 Frappe | 2024-11-21 | 7.5 High |
In core/doctype/prepared_report/prepared_report.py in Frappe 11 and 12, data files generated with Prepared Report were being stored as public files (no authentication is required to access; having a link is sufficient) instead of private files. | ||||
CVE-2019-15700 | 1 Frappe | 1 Frappe | 2024-11-21 | N/A |
public/js/frappe/form/footer/timeline.js in Frappe Framework 12 through 12.0.8 does not escape HTML in the timeline and thus is affected by crafted "changed value of" text. | ||||
CVE-2019-14967 | 1 Frappe | 1 Frappe | 2024-11-21 | N/A |
An issue was discovered in Frappe Framework 10, 11 before 11.1.46, and 12. There exists an XSS vulnerability. | ||||
CVE-2019-14966 | 1 Frappe | 1 Frappe | 2024-11-21 | N/A |
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. There exists an authenticated SQL injection. | ||||
CVE-2019-14965 | 1 Frappe | 1 Frappe | 2024-11-21 | N/A |
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists. |