Filtered by vendor Simmeth
Subscriptions
Filtered by product Lieferantenmanager
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-44017 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 7.5 High |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout. | ||||
CVE-2022-44016 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 7.5 High |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '"ImagesPath":"C:\\"' value. | ||||
CVE-2022-44015 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 9.8 Critical |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure. | ||||
CVE-2022-44014 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 6.5 Medium |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. In the design of the API, a user is inherently able to fetch arbitrary SQL tables. This leaks all user passwords and MSSQL hashes via /DS/LM_API/api/SelectionService/GetPaggedTab. | ||||
CVE-2022-44013 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 9.1 Critical |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can make various API calls without authentication because the password in a Credential Object is not checked. | ||||
CVE-2022-44012 | 1 Simmeth | 1 Lieferantenmanager | 2024-11-21 | 5.4 Medium |
An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted. |
Page 1 of 1.