Filtered by vendor Rockoa
Subscriptions
Total
18 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-48930 | 1 Rockoa | 1 Xinhu | 2024-11-26 | 9.8 Critical |
xinhu xinhuoa 2.2.1 contains a File upload vulnerability. | ||||
CVE-2024-37624 | 1 Rockoa | 1 Xinhu | 2024-11-21 | 6.1 Medium |
Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component. | ||||
CVE-2024-37623 | 1 Rockoa | 1 Xinhu | 2024-11-21 | 6.1 Medium |
Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /kaoqin/tpl_kaoqin_locationchange.html component. | ||||
CVE-2023-5297 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 3.7 Low |
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927. | ||||
CVE-2023-5296 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 4.3 Medium |
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability. | ||||
CVE-2023-49363 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 9.8 Critical |
Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php. | ||||
CVE-2023-1773 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 6.3 Medium |
A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability. | ||||
CVE-2023-1501 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 6.3 Medium |
A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability. | ||||
CVE-2022-45041 | 1 Rockoa | 1 Xinhu | 2024-11-21 | 7.5 High |
SQL Injection exits in xinhu < 2.5.0 | ||||
CVE-2020-35388 | 1 Rockoa | 1 Xinhu | 2024-11-21 | 7.5 High |
rainrocka xinhu 2.1.9 allows remote attackers to obtain sensitive information via an index.php?a=gettotal request in which the ajaxbool value is manipulated to be true. | ||||
CVE-2020-21147 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 4.8 Medium |
RockOA V1.9.8 is affected by a cross-site scripting (XSS) vulnerability which allows remote attackers to send malicious code to the administrator and execute JavaScript code, because webmain/flow/input/mode_emailmAction.php does not perform strict filtering. | ||||
CVE-2020-20593 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 8.0 High |
A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account. | ||||
CVE-2020-18716 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 9.8 Critical |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordAction.php. | ||||
CVE-2020-18714 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 9.8 Critical |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordModel.php's getdata function. | ||||
CVE-2020-18713 | 1 Rockoa | 1 Rockoa | 2024-11-21 | 9.8 Critical |
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in customerAction.php | ||||
CVE-2019-9846 | 1 Rockoa | 1 Rockoa | 2024-11-21 | N/A |
RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection. | ||||
CVE-2024-48213 | 1 Rockoa | 1 Xinhu | 2024-10-31 | 4.3 Medium |
RockOA v2.6.5 is vulnerable to Directory Traversal in webmain/system/beifen/beifenAction.php. | ||||
CVE-2024-7327 | 1 Rockoa | 1 Xinhu | 2024-08-23 | 6.3 Medium |
A vulnerability classified as critical was found in Xinhu RockOA 2.6.2. This vulnerability affects the function dataAction of the file /webmain/task/openapi/openmodhetongAction.php. The manipulation of the argument nickName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273250 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
Page 1 of 1.