PeopleSoft PeopleTools 8.1x, 8.2x, and 8.4x allows remote attackers to execute arbitrary commands by uploading a file to the IClient Servlet, guessing the insufficiently random (system time) name of the directory used to store the file, and directly requesting that file.
Max CVSS
7.5
EPSS Score
1.33%
Published
2003-12-15
Updated
2017-07-11
Cross-site scripting (XSS) vulnerability in PeopleSoft IScript environment for PeopleTools 8.43 and earlier allows remote attackers to insert arbitrary web script via a certain HTTP request to IScript.
Max CVSS
4.3
EPSS Score
0.14%
Published
2003-12-15
Updated
2016-10-18
PeopleSoft Gateway Administration servlet (gateway.administration) in PeopleTools 8.43 and earlier allows remote attackers to obtain the full pathnames for server-side include (SSI) files via an HTTP request with an invalid value.
Max CVSS
5.0
EPSS Score
0.48%
Published
2003-12-15
Updated
2016-10-18
psdoccgi.exe in PeopleSoft PeopleTools 8.4 through 8.43 allows remote attackers to cause a denial of service (application crash), possibly via the headername and footername arguments.
Max CVSS
5.0
EPSS Score
1.44%
Published
2003-12-31
Updated
2017-07-11
psdoccgi.exe in PeopleSoft PeopleTools 8.4 through 8.43 allows remote attackers to read arbitrary files via the (1) headername or (2) footername arguments.
Max CVSS
5.0
EPSS Score
0.88%
Published
2003-11-13
Updated
2017-07-11
Directory traversal vulnerability in PeopleTools 8.10 through 8.18, 8.40, and 8.41 allows remote attackers to overwrite arbitrary files via the SchedulerTransfer servlet.
Max CVSS
5.0
EPSS Score
0.65%
Published
2003-03-18
Updated
2008-09-05
The Application Messaging Gateway for PeopleTools 8.1x before 8.19, as used in various PeopleSoft products, allows remote attackers to read arbitrary files via certain XML External Entities (XXE) fields in an HTTP POST request that is processed by the SimpleFileHandler handler.
Max CVSS
5.0
EPSS Score
0.41%
Published
2003-02-07
Updated
2008-09-10
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!