Oneclickorgs

One Click Orgs

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 06.12.2011 11:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

One Click Orgs before 1.2.3 allows remote authenticated users to trigger crafted SMTP traffic via (1) " (double quote) and newline characters in an org name or (2) " (double quote) characters in an e-mail address, related to a "2nd Order SMTP Injecti...

  • EPSS 0.4%
  • Veröffentlicht 06.12.2011 11:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

One Click Orgs before 1.2.3 does not require unique e-mail addresses for user accounts, which allows remote authenticated users to cause a denial of service (login disruption) or spoof votes or comments by selecting a conflicting e-mail address.

  • EPSS 0.52%
  • Veröffentlicht 06.12.2011 11:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

One Click Orgs before 1.2.3 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.

  • EPSS 0.25%
  • Veröffentlicht 06.12.2011 11:55:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The password reset feature in One Click Orgs before 1.2.3 generates different error messages for failed reset attempts depending on whether the e-mail address is registered, which allows remote attackers to enumerate user accounts via a series of req...

  • EPSS 0.23%
  • Veröffentlicht 06.12.2011 11:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in One Click Orgs before 1.2.3 allow remote attackers to inject arbitrary web script or HTML via the description field of (1) a new vote or (2) the eject member proposal feature.

  • EPSS 0.22%
  • Veröffentlicht 06.12.2011 11:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple open redirect vulnerabilities in One Click Orgs before 1.2.3 allow (1) remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the return_to parameter, and allow (2) remote authenticated users to redirect u...