Filtered by vendor Zend
Subscriptions
Filtered by product Zendto
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2013-6808 | 1 Zend | 1 Zendto | 2025-04-11 | N/A |
Cross-site scripting (XSS) vulnerability in lib/NSSDropoff.php in ZendTo before 4.11-13 allows remote attackers to inject arbitrary web script or HTML via a modified emailAddr field to pickup.php. | ||||
CVE-2025-32352 | 1 Zend | 1 Zendto | 2025-04-07 | 4.8 Medium |
A type confusion vulnerability in lib/NSSAuthenticator.php in ZendTo before v5.04-7 allows remote attackers to bypass authentication for users with passwords stored as MD5 hashes that can be interpreted as numbers. A solution requires moving from MD5 to bcrypt. | ||||
CVE-2021-47667 | 1 Zend | 1 Zendto | 2025-04-07 | 10 Critical |
An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. | ||||
CVE-2021-27888 | 1 Zend | 1 Zendto | 2024-11-21 | 6.1 Medium |
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters. | ||||
CVE-2020-8986 | 1 Zend | 1 Zendto | 2024-11-21 | 9.8 Critical |
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests. | ||||
CVE-2020-8985 | 1 Zend | 1 Zendto | 2024-11-21 | 8.8 High |
ZendTo prior to 5.22-2 Beta allowed reflected XSS and CSRF via the unlock.tpl unlock user functionality. | ||||
CVE-2020-8984 | 1 Zend | 1 Zendto | 2024-11-21 | 7.5 High |
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta allowed IP address spoofing via the X-Forwarded-For header. | ||||
CVE-2018-1000841 | 1 Zend | 1 Zendto | 2024-11-21 | N/A |
Zend.To version Prior to 5.15-1 contains a Cross Site Scripting (XSS) vulnerability in The verify.php page that can result in An attacker could execute arbitrary Javascript code in the context of the victim's browser.. This attack appear to be exploitable via HTTP POST request. This vulnerability appears to have been fixed in 5.16-1 Beta. |
Page 1 of 1.