3 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in Weaver e-cology. It has been rated as critical. This issue affects some unknown processing of the file filelFileDownloadForOutDoc.class of the component HTTP POST Request Handler. The manipulation of the argument fileid with the input 1+WAITFOR+DELAY leads to sql injection. Upgrading to version 10.58.0 is able to address this issue. • https://vuldb.com/?ctiid.235061 https://vuldb.com/?id.235061 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. • https://github.com/Strangenees/e-cology/blob/main/main.md https://vuldb.com/?ctiid.229411 https://vuldb.com/?id.229411 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Weaver e-cology 9.0. There is a CRLF Injection vulnerability via the /workflow/request/ViewRequestForwardSPA.jsp isintervenor parameter, as demonstrated by the %0aSet-cookie: substring. Se descubrió un problema en Weaver e-cology versión 9.0. Existe una vulnerabilidad de inyección CRLF a través de /workflow/request/ViewRequestForwardSPA.jsp, como lo demuestra el parámetro %0aSet-cookie: substring. • https://expzh.com/Weaver-e-cology9.0-CRLF-Injection.pdf https://www.weaver.com.cn/cs/securityDownload.asp • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') •