Filtered by vendor Rukovoditel
Subscribe
Total
36 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-18470 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Stored cross-site scripting (XSS) vulnerability in the Name of application field found in the General Configuration page in Rukovoditel 2.4.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to rukovoditel_2.4.1/install/index.php. | |||||
CVE-2020-35984 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
A stored cross site scripting (XSS) vulnerability in the 'Users Alerts' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' parameter. | |||||
CVE-2020-35987 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
A stored cross site scripting (XSS) vulnerability in the 'Entities List' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter. | |||||
CVE-2020-11815 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 6.8 MEDIUM | 9.8 CRITICAL |
In Rukovoditel 2.5.2, attackers can upload arbitrary file to the server by just changing the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs without the Maintenance Mode setting. | |||||
CVE-2020-11812 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the filters[0][value] or filters[1][value] parameter. | |||||
CVE-2020-11819 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution. | |||||
CVE-2020-11817 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 6.8 MEDIUM | 9.8 CRITICAL |
In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode setting. | |||||
CVE-2020-11816 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the reports_id (POST) parameter. | |||||
CVE-2020-11818 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
In Rukovoditel 2.5.2 has a form_session_token value to prevent CSRF attacks. This protection mechanism can be bypassed with another user's valid token. Thus, an attacker can change the Admin password by using a CSRF attack and escalate his/her privileges. | |||||
CVE-2020-11820 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the entities_id parameter. | |||||
CVE-2020-11821 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them. | |||||
CVE-2020-11813 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the configuration page via the copyright text input. Thus, an attacker can inject a malicious script to steal all users' valuable data. This copyright text is on every page so this attack vector can be very dangerous. | |||||
CVE-2020-11822 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the application structure --> user access groups page. Thus, an attacker can inject malicious script to steal all users' valuable data. | |||||
CVE-2019-7541 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Rukovoditel through 2.4.1 allows XSS via a URL that lacks a module=users%2flogin substring. | |||||
CVE-2019-7400 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Rukovoditel before 2.4.1 allows XSS. | |||||
CVE-2018-20166 | 1 Rukovoditel | 1 Rukovoditel | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension. |