9 results (0.004 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 2

06 Feb 2024 — Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function. Vulnerabilidad de Directory Traversal en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar código arbitrario a través de un payload manipulado en el parámetro fileName de la función Guardar. • https://github.com/trustcves/CVE-2024-24398 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

05 Feb 2024 — Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component. Vulnerabilidad de Cross Site Scripting en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar código arbitrario a través de un payload diseñado en el componente de la barra de búsqueda. • https://github.com/trustcves/CVE-2024-24396 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

05 Feb 2024 — Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field. Vulnerabilidad de Cross Site Scripting en Stimulsoft GmbH Stimulsoft Dashboard.JS anterior a v.2024.1.2 permite a un atacante remoto ejecutar código arbitrario a través de un payload manipulado en el campo ReportName. • https://github.com/trustcves/CVE-2024-24397 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

28 Mar 2023 — Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion. • https://github.com/trustcves/CVE-2023-25260 • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

28 Mar 2023 — Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server h... • https://github.com/trustcves/CVE-2023-25262 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 2

27 Mar 2023 — In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems. • https://github.com/trustcves/CVE-2023-25263 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 10.0EPSS: 2%CPEs: 5EXPL: 1

27 Mar 2023 — Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report. • https://github.com/trustcves/CVE-2023-25261 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

29 Oct 2022 — Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0, when Compilation Mode is used, allows an attacker to execute arbitrary C# code on any machine that renders a report, including the application server or a user's local machine, as demonstrated by System.Diagnostics.Process.Start. Stimulsoft (también conocido como Stimulsoft Reports) 2013.1.1600.0, cuando se utiliza Compilation Mode, permite a un atacante ejecutar código C# arbitrario en cualquier máquina que genere un informe, incluido el servidor de aplica... • http://burninatorsec.blogspot.com/2022/04/library-rce-object-chaining-cve-2021.html • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 1

18 Aug 2020 — A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and executed on the server that processes this file. This can be used to fully compromise the server. Una vulnerabilidad de ejecución de código remota en Stimulsoft (también se conoce como Stimulsoft Reports) versiones 2013.1.1600.0, permite a un atacante codificar scripts C# como base-64 en el archivo XML del repor... • http://burninatorsec.blogspot.com/2018/11/reporting-c-serialization-remote-code.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •