Filtered by vendor Artica Subscriptions
Filtered by product Integria Ims Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-3834 1 Artica 1 Integria Ims 2024-11-21 5.4 Medium
Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS).
CVE-2021-3833 1 Artica 1 Integria Ims 2024-11-21 9.8 Critical
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
CVE-2021-3832 1 Artica 1 Integria Ims 2024-11-21 9.8 Critical
Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability.
CVE-2019-15091 1 Artica 1 Integria Ims 2024-11-21 N/A
filemgr.php in Artica Integria IMS 5.0.86 allows index.php?sec=wiki&sec2=operation/wiki/wiki&action=upload arbitrary file upload.
CVE-2018-19829 1 Artica 1 Integria Ims 2024-11-21 N/A
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-19828 1 Artica 1 Integria Ims 2024-11-21 N/A
Artica Integria IMS 5.0.83 has XSS via the search_string parameter.
CVE-2018-1000812 1 Artica 1 Integria Ims 2024-11-21 N/A
Artica Integria IMS version 5.0 MR56 Package 58, likely earlier versions contains a CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Password recovery process, line 45 of general/password_recovery.php that can result in IntegriaIMS web app user accounts can be taken over. This attack appear to be exploitable via Network access to IntegriaIMS web interface . This vulnerability appears to have been fixed in fixed in versions released after commit f2ff0ba821644acecb893483c86a9c4d3bb75047.