Filtered by vendor Stimulsoft
Subscribe
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-24398 | 1 Stimulsoft | 1 Dashboards.php | 2024-11-21 | N/A | 9.8 CRITICAL |
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function. | |||||
CVE-2024-24397 | 1 Stimulsoft | 1 Dashboards.js | 2024-11-21 | N/A | 5.4 MEDIUM |
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field. | |||||
CVE-2024-24396 | 1 Stimulsoft | 1 Dashboard.js | 2024-11-21 | N/A | 6.1 MEDIUM |
Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component. | |||||
CVE-2023-25263 | 1 Stimulsoft | 1 Designer | 2024-11-21 | N/A | 5.5 MEDIUM |
In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems. | |||||
CVE-2023-25262 | 1 Stimulsoft | 1 Designer | 2024-11-21 | N/A | 7.5 HIGH |
Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web). | |||||
CVE-2023-25261 | 1 Stimulsoft | 2 Designer, Viewer | 2024-11-21 | N/A | 9.8 CRITICAL |
Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report. | |||||
CVE-2023-25260 | 1 Stimulsoft | 1 Designer | 2024-11-21 | N/A | 7.5 HIGH |
Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion. | |||||
CVE-2021-42777 | 1 Stimulsoft | 1 Reports | 2024-11-21 | N/A | 9.8 CRITICAL |
Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0, when Compilation Mode is used, allows an attacker to execute arbitrary C# code on any machine that renders a report, including the application server or a user's local machine, as demonstrated by System.Diagnostics.Process.Start. | |||||
CVE-2020-15865 | 1 Stimulsoft | 1 Reports | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and executed on the server that processes this file. This can be used to fully compromise the server. |