Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-5297 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 2.6 LOW | 3.7 LOW |
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927. | |||||
CVE-2023-5296 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability. | |||||
CVE-2023-49363 | 1 Rockoa | 1 Rockoa | 2024-11-21 | N/A | 9.8 CRITICAL |
Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php. | |||||
CVE-2023-1501 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability. | |||||
CVE-2020-21147 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 3.5 LOW | 4.8 MEDIUM |
RockOA V1.9.8 is affected by a cross-site scripting (XSS) vulnerability which allows remote attackers to send malicious code to the administrator and execute JavaScript code, because webmain/flow/input/mode_emailmAction.php does not perform strict filtering. | |||||
CVE-2020-20593 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 6.0 MEDIUM | 8.0 HIGH |
A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account. | |||||
CVE-2020-18716 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordAction.php. | |||||
CVE-2020-18714 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordModel.php's getdata function. | |||||
CVE-2020-18713 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in customerAction.php | |||||
CVE-2019-9846 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 4.0 MEDIUM | 8.8 HIGH |
RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection. |