Known Vulnerabilities for Sql-ledger by Sql-ledger

Listed below are 10 of the newest known vulnerabilities associated with the software "Sql-ledger" by "Sql-ledger".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2017-2808 An exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially craf... 7.5 - High 2017-09-05 2022-04-19
CVE-2017-2807 An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted... 7.5 - High 2017-09-05 2022-04-19
CVE-2009-4402 The default configuration of SQL-Ledger 2.8.24 allows remote attackers to perform unspecified administrative operations by pr... 7.5 - HIGH 2009-12-23 2018-10-10
CVE-2009-3584 SQL-Ledger 2.8.24 does not set the secure flag for the session cookie in an https session, which makes it easier for remote a... 5 - MEDIUM 2009-12-23 2018-10-10
CVE-2009-3583 Directory traversal vulnerability in the Preferences menu item in SQL-Ledger 2.8.24 allows remote attackers to include and ex... 5.1 - MEDIUM 2009-12-23 2018-10-10
CVE-2009-3582 Multiple SQL injection vulnerabilities in the delete subroutine in SQL-Ledger 2.8.24 allow remote authenticated users to exec... 6.5 - MEDIUM 2009-12-23 2018-10-10
CVE-2009-3581 Multiple cross-site scripting (XSS) vulnerabilities in SQL-Ledger 2.8.24 allow remote authenticated users to inject arbitrary... 3.5 - LOW 2009-12-23 2018-10-10
CVE-2009-3580 Cross-site request forgery (CSRF) vulnerability in am.pl in SQL-Ledger 2.8.24 allows remote attackers to hijack the authentic... 6.8 - MEDIUM 2009-12-23 2018-10-10
CVE-2008-4078 SQL injection vulnerability in the AR/AP transaction report in (1) LedgerSMB (LSMB) before 1.2.15 and (2) SQL-Ledger 2.8.17 a... 6.5 - MEDIUM 2008-09-15 2018-10-11
CVE-2008-4077 The CGI scripts in (1) LedgerSMB (LSMB) before 1.2.15 and (2) SQL-Ledger 2.8.17 and earlier allow remote attackers to cause a... 7.8 - HIGH 2008-09-15 2018-10-11

Popular searches for Sql-ledger

SQL-Ledger ERP

www.sql-ledger.com

L-Ledger ERP L-Ledger is a webbased ERP system which runs on any NIX, Mac or Windows platform. Built with freely available software so you are never locked in. Intuitive interface so the learning curve is kept to a minimum. After all who wants to spend hours learning a new program.

sql-ledger.org SQL-Ledger Enterprise resource planning Computer program Software Microsoft Windows Learning curve Unix-like MacOS Graphical user interface Interface (computing) Web browser SQL Database server Perl Programming language Free software Out of the box (feature) Data Learning Vendor lock-in

SQL-Ledger - Wikipedia

en.wikipedia.org/wiki/SQL-Ledger

L-Ledger - Wikipedia L-Ledger is an ERP and double entry accounting system. Accounting data is stored in an SQL Database Server and a standard web browser can be used as its user interface. The system uses the Perl language with a database interface module for processing and PostgreSQL for data storage which is the preferred platform. The download version also includes schemas for IBM's DB2 database server as well as Oracle.

en.wikipedia.org/wiki/SQL_Ledger en.m.wikipedia.org/wiki/SQL-Ledger en.m.wikipedia.org/wiki/SQL_Ledger SQL-Ledger Database server Wikipedia User interface SQL Double-entry bookkeeping system Enterprise resource planning Computer data storage Perl Web browser Database PostgreSQL GNU General Public License Computing platform IBM Db2 Family Software license Modular programming Data Accounting software Free software

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report