Filtered by vendor Processmaker
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-38577 | 1 Processmaker | 1 Processmaker | 2024-02-28 | N/A | 8.8 HIGH |
ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the user profile page. This vulnerability allows attackers to escalate normal users to Administrators. | |||||
CVE-2020-13525 | 1 Processmaker | 1 Processmaker | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | |||||
CVE-2020-13526 | 1 Processmaker | 1 Processmaker | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerability exists in the handling of sort parameters in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. The reportTables_Ajax and clientSetupAjax pages are vulnerable to SQL injection in the sort parameter.An attacker can make an authenticated HTTP request to trigger these vulnerabilities. | |||||
CVE-2016-9045 | 1 Processmaker | 1 Processmaker | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
A code execution vulnerability exists in ProcessMaker Enterprise Core 3.0.1.7-community. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability. | |||||
CVE-2016-9048 | 1 Processmaker | 1 Processmaker | 2024-02-28 | 6.5 MEDIUM | 7.4 HIGH |
Multiple exploitable SQL Injection vulnerabilities exists in ProcessMaker Enterprise Core 3.0.1.7-community. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain setups access the underlying operating system. |