Vulnerabilities (CVE)

Filtered by vendor Coins-global Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-45228 1 Coins-global 1 Coins Construction Cloud 2024-02-04 3.5 LOW 5.4 MEDIUM
An XSS issue was discovered in COINS Construction Cloud 11.12. Due to insufficient neutralization of user input in the description of a task, it is possible to store malicious JavaScript code in the task description. This is later executed when it is reflected back to the user.
CVE-2021-45227 1 Coins-global 1 Coins Construction Cloud 2024-02-04 3.5 LOW 5.4 MEDIUM
An issue was discovered in COINS Construction Cloud 11.12. Due to an inappropriate use of HTML IFRAME elements, the file upload functionality is vulnerable to a persistent Cross-Site Scripting (XSS) attack.
CVE-2021-45225 1 Coins-global 1 Construction Cloud 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in COINS Construction Cloud 11.12. Due to improper input neutralization, it is vulnerable to reflected cross-site scripting (XSS) via malicious links (affecting the search window and activity view window).
CVE-2021-45222 1 Coins-global 1 Construction Cloud 2024-02-04 6.5 MEDIUM 8.8 HIGH
An issue was discovered in COINS Construction Cloud 11.12. Due to logical flaws in the human ressources interface, it is vulnerable to privilege escalation by HR personnel.
CVE-2021-45223 1 Coins-global 1 Construction Cloud 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in COINS Construction Cloud 11.12. Due to insufficient input neutralization, it is vulnerable to denial of service attacks via forced server crashes.
CVE-2021-45226 1 Coins-global 1 Construction Cloud 2024-02-04 4.3 MEDIUM 6.5 MEDIUM
An issue was discovered in COINS Construction Cloud 11.12. Due to improper validation of user-controlled HTTP headers, attackers can cause it to send password-reset e-mails pointing to arbitrary websites.
CVE-2021-45224 1 Coins-global 1 Construction Cloud 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in COINS Construction Cloud 11.12. In several locations throughout the application, JavaScript code is passed as a URL parameter. Attackers can trivially alter this code to cause malicious behaviour. The application is therefore vulnerable to reflected XSS via malicious URLs.