Filtered by vendor Filecloud
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-1958 | 1 Filecloud | 1 Filecloud | 2024-05-17 | 4.0 MEDIUM | 6.5 MEDIUM |
A vulnerability classified as critical has been found in FileCloud. Affected is an unknown function of the component NTFS Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. Upgrading to version 21.3.5.18513 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-201960. | |||||
CVE-2022-39833 | 1 Filecloud | 1 Filecloud | 2024-02-28 | N/A | 7.2 HIGH |
FileCloud Versions 20.2 and later allows remote attackers to potentially cause unauthorized remote code execution and access to reported API endpoints via a crafted HTTP request. | |||||
CVE-2022-24633 | 1 Filecloud | 1 Filecloud | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
All versions of FileCloud prior to 21.3 are vulnerable to user enumeration. The vulnerability exists in the parameter "path" passing "/SHARED/<username>". A malicious actor could identify the existence of users by requesting share information on specified share paths. | |||||
CVE-2022-25242 | 1 Filecloud | 1 Filecloud | 2024-02-28 | 5.1 MEDIUM | 8.8 HIGH |
In FileCloud before 21.3, file upload is not protected against Cross-Site Request Forgery (CSRF). | |||||
CVE-2022-25241 | 1 Filecloud | 1 Filecloud | 2024-02-28 | 5.1 MEDIUM | 8.8 HIGH |
In FileCloud before 21.3, the CSV user import functionality is vulnerable to Cross-Site Request Forgery (CSRF). | |||||
CVE-2020-26524 | 1 Filecloud | 1 Filecloud | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
CodeLathe FileCloud before 20.2.0.11915 allows username enumeration. | |||||
CVE-2016-6578 | 1 Filecloud | 1 Filecloud | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
CodeLathe FileCloud, version 13.0.0.32841 and earlier, contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. |