3 results (0.015 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php. Rockoa en versiones &lt; 2.3.3 es vulnerable a la inyección SQL. El problema existe en el método indexAction en reimpAction.php. • https://github.com/wednesdaygogo/Vulnerability-recurrence/blob/main/rockoa%20less%20than%202.3.3%20sql%20injection%20vulnerability.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. • https://github.com/magicwave18/vuldb/issues/1 https://vuldb.com/?ctiid.240926 https://vuldb.com/?id.240926 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection. RockOA versión 1.8.7 permite a los atacantes remotos obtener información confidencial porque el método webmain / webmainAction.php publictreestore construye una cláusula WHERE de SQL de forma poco segura mediante el uso de los parámetros pidfields e idfields, también conocido como inyección SQL background. • https://www.seebug.org/vuldb/ssvid-97861 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •