trustcves

13 exploits Active since Mar 2023
CVE-2023-31433 NOMISEC HIGH WRITEUP
Logbuch <8.2.2286, <9.0.2401 - SQL Injection
A SQL injection issue in Logbuch in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 allows authenticated attackers to execute SQL statements via the welche parameter.
1 stars
CVSS 8.8
CVE-2024-56882 NOMISEC MEDIUM WRITEUP
Sage DPW <2024_12_000 - XSS
Sage DPW before 2024_12_000 is vulnerable to Cross Site Scripting (XSS). Low-privileged Sage users with employee role privileges can permanently store JavaScript code in the Kurstitel and Kurzinfo input fields. The injected payload is executed for each authenticated user who views and interacts with the modified data elements.
CVSS 5.4
CVE-2024-56883 NOMISEC HIGH WRITEUP
Sage DPW <2024_12_001 - Incorrect Access Control
Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the "id" parameter is replaced with the ID of another user.
CVSS 8.1
CVE-2024-24396 NOMISEC MEDIUM WRITEUP
Stimulsoft Dashboard.js < 2024.1.2 - Code Injection
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
CVSS 6.1
CVE-2024-24397 NOMISEC MEDIUM WRITEUP
Stimulsoft Dashboards.js < 2024.1.2 - XSS
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field.
CVSS 5.4
CVE-2024-24398 NOMISEC CRITICAL WRITEUP
Stimulsoft Dashboards.php < 2024.1.2 - Path Traversal
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
CVSS 9.8
CVE-2023-35801 NOMISEC HIGH WRITEUP
Safe Fme Server < 2022.2.5 - Path Traversal
A directory traversal vulnerability in Safe Software FME Server before 2022.2.5 allows an attacker to bypass validation when editing a network-based resource connection, resulting in the unauthorized reading and writing of arbitrary files. Successful exploitation requires an attacker to have access to a user account with write privileges. FME Flow 2023.0 is also a fixed version.
CVSS 8.1
CVE-2023-31435 NOMISEC HIGH WRITEUP
evasys <8.2.2286 & <9.0.2401 - Info Disclosure
Multiple components (such as Onlinetemplate-Verwaltung, Liste aller Teilbereiche, Umfragen anzeigen, and questionnaire previews) in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 allow authenticated attackers to read and write to unauthorized data by accessing functions directly.
CVSS 8.1
CVE-2023-25261 NOMISEC CRITICAL WRITEUP
Stimulsoft Designer - Code Injection
Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report.
CVSS 9.8
CVE-2023-25262 NOMISEC HIGH WRITEUP
Stimulsoft Designer - SSRF
Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
CVSS 7.5
CVE-2023-25263 NOMISEC MEDIUM WRITEUP
Stimulsoft Designer - Cleartext Storage
In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
CVSS 5.5
CVE-2023-31434 NOMISEC MEDIUM WRITEUP
evasys <8.2.2286 & <9.0.2401 - XSS
The parameters nutzer_titel, nutzer_vn, and nutzer_nn in the user profile, and langID and ONLINEID in direct links, in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 do not validate input, which allows authenticated attackers to inject HTML Code and XSS payloads in multiple locations.
CVSS 5.4
CVE-2023-25260 NOMISEC HIGH WRITEUP
Stimulsoft Designer (Web) 2023.1.3 - Local File Inclusion
Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.
CVSS 7.5