Vulnerabilities (CVE)

Filtered by vendor Rockoa Subscribe
Filtered by product Rockoa
Total 11 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5297 1 Rockoa 1 Rockoa 2024-11-21 2.6 LOW 3.7 LOW
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.
CVE-2023-5296 1 Rockoa 1 Rockoa 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability.
CVE-2023-49363 1 Rockoa 1 Rockoa 2024-11-21 N/A 9.8 CRITICAL
Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php.
CVE-2023-1773 1 Rockoa 1 Rockoa 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability.
CVE-2023-1501 1 Rockoa 1 Rockoa 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability.
CVE-2020-21147 1 Rockoa 1 Rockoa 2024-11-21 3.5 LOW 4.8 MEDIUM
RockOA V1.9.8 is affected by a cross-site scripting (XSS) vulnerability which allows remote attackers to send malicious code to the administrator and execute JavaScript code, because webmain/flow/input/mode_emailmAction.php does not perform strict filtering.
CVE-2020-20593 1 Rockoa 1 Rockoa 2024-11-21 6.0 MEDIUM 8.0 HIGH
A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account.
CVE-2020-18716 1 Rockoa 1 Rockoa 2024-11-21 7.5 HIGH 9.8 CRITICAL
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordAction.php.
CVE-2020-18714 1 Rockoa 1 Rockoa 2024-11-21 7.5 HIGH 9.8 CRITICAL
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in wordModel.php's getdata function.
CVE-2020-18713 1 Rockoa 1 Rockoa 2024-11-21 7.5 HIGH 9.8 CRITICAL
SQL Injection in Rockoa v1.8.7 allows remote attackers to gain privileges due to loose filtering of parameters in customerAction.php
CVE-2019-9846 1 Rockoa 1 Rockoa 2024-11-21 4.0 MEDIUM 8.8 HIGH
RockOA 1.8.7 allows remote attackers to obtain sensitive information because the webmain/webmainAction.php publictreestore method constructs a SQL WHERE clause unsafely by using the pidfields and idfields parameters, aka background SQL injection.