cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-45031,https://securityvulnerability.io/vulnerability/CVE-2024-45031,Incomplete HTML Tags Can Bypass HTML Sanitization and Lead to XSS Injection in Syncope Console,"A cross-site scripting (XSS) vulnerability has been identified in the Apache Syncope Console. The vulnerability arises from the usage of incomplete HTML tags during the object editing process, allowing attackers to circumvent HTML sanitization measures. This could lead to the injection of stored XSS payloads that are executed for other users while they engage with the application normally. Additionally, similar XSS payloads can be injected in the Syncope Enduser interface when users edit their 'Personal Information' or 'User Requests.' This compromises the security of the console, as it potentially enables session hijacking for administrators working within the Syncope Console. Users are strongly advised to upgrade to version 3.0.9, which effectively addresses this security issue.",Apache,Apache Syncope,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-24T14:21:35.279Z,0 CVE-2024-38503,https://securityvulnerability.io/vulnerability/CVE-2024-38503,HTML Tag Vulnerability in Syncope Console Could Lead to Exploits,"When editing a user, group or any object in the Syncope Console, HTML tags could be added to any text field and could lead to potential exploits. The same vulnerability was found in the Syncope Enduser, when editing “Personal Information” or “User Requests”. Users are recommended to upgrade to version 3.0.8, which fixes this issue.",Apache,Apache Syncope,5.4,MEDIUM,0.0006200000061653554,false,,false,false,false,,,false,false,,2024-07-22T09:46:39.285Z,0 CVE-2020-11977,https://securityvulnerability.io/vulnerability/CVE-2020-11977,,"In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution.",Apache,Apache Syncope,7.2,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2020-09-15T19:02:51.000Z,0 CVE-2020-1961,https://securityvulnerability.io/vulnerability/CVE-2020-1961,,"Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.",Apache,Apache Syncope,9.8,CRITICAL,0.0012100000167265534,false,,false,false,false,,,false,false,,2020-05-04T12:28:53.000Z,0 CVE-2019-17557,https://securityvulnerability.io/vulnerability/CVE-2019-17557,,"It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.",Apache,Apache Syncope,5.4,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2020-05-04T12:27:31.000Z,0 CVE-2020-1959,https://securityvulnerability.io/vulnerability/CVE-2020-1959,,"A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.",Apache,Apache Syncope,9.8,CRITICAL,0.0024399999529123306,false,,false,false,false,,,false,false,,2020-05-04T12:25:18.000Z,0 CVE-2018-17184,https://securityvulnerability.io/vulnerability/CVE-2018-17184,,"A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.",Apache,Apache Syncope,5.4,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2018-11-06T00:00:00.000Z,0 CVE-2018-17186,https://securityvulnerability.io/vulnerability/CVE-2018-17186,,"An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.",Apache,Apache Syncope,7.2,HIGH,0.0016299999551847577,false,,false,false,false,,,false,false,,2018-11-06T00:00:00.000Z,0 CVE-2018-1322,https://securityvulnerability.io/vulnerability/CVE-2018-1322,,"An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11, 2.0.x before 2.0.8, and unsupported releases 1.0.x and 1.1.x which may be also affected, can recover sensitive security values using the fiql and orderby parameters.",Apache,Apache Syncope,4.9,MEDIUM,0.0015699999639764428,false,,false,false,false,,,false,false,,2018-03-20T17:29:00.000Z,0 CVE-2018-1321,https://securityvulnerability.io/vulnerability/CVE-2018-1321,,"An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11, 2.0.x before 2.0.8, and unsupported releases 1.0.x and 1.1.x which may be also affected, can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.",Apache,Apache Syncope,7.2,HIGH,0.013939999975264072,false,,false,false,false,,,false,false,,2018-03-20T17:29:00.000Z,0