Filtered by vendor Salesagility
Subscriptions
Total
84 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-6126 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 9.8 Critical |
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | ||||
CVE-2023-6125 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | ||||
CVE-2023-6124 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 4.3 Medium |
Server-Side Request Forgery (SSRF) in GitHub repository salesagility/suitecrm prior to 7.14.2, 8.4.2, 7.12.14. | ||||
CVE-2023-5353 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 6.5 Medium |
Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.14.1. | ||||
CVE-2023-5351 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 5.4 Medium |
Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm prior to 7.14.1. | ||||
CVE-2023-5350 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 9.1 Critical |
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1. | ||||
CVE-2023-3627 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
Cross-Site Request Forgery (CSRF) in GitHub repository salesagility/suitecrm-core prior to 8.3.1. | ||||
CVE-2023-1034 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.12.9. | ||||
CVE-2022-27474 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 7.2 High |
SuiteCRM v7.11.23 was discovered to allow remote code execution via a crafted payload injected into the FirstName text field. | ||||
CVE-2022-23940 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution. | ||||
CVE-2022-0756 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 6.5 Medium |
Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5. | ||||
CVE-2022-0755 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 4.3 Medium |
Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5. | ||||
CVE-2022-0754 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 6.5 Medium |
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.12.5. | ||||
CVE-2021-45903 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 6.1 Medium |
A persistent cross-site scripting (XSS) issue in the web interface of SuiteCRM before 7.10.35, and 7.11.x and 7.12.x before 7.12.2, allows a remote attacker to introduce arbitrary JavaScript via attachments upload, a different vulnerability than CVE-2021-39267 and CVE-2021-39268. | ||||
CVE-2021-45899 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 9.8 Critical |
SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows PHAR deserialization that can lead to remote code execution. | ||||
CVE-2021-45898 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 9.8 Critical |
SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows local file inclusion. | ||||
CVE-2021-45897 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution. | ||||
CVE-2021-45041 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection via the Tooltips action in the Project module, involving resource_id and start_date. | ||||
CVE-2021-42840 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328. | ||||
CVE-2021-41869 | 1 Salesagility | 1 Suitecrm | 2024-11-21 | 8.8 High |
SuiteCRM 7.10.x before 7.10.33 and 7.11.x before 7.11.22 is vulnerable to privilege escalation. |