Vulnerabilities (CVE)

Filtered by vendor Unit4 Subscribe
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34001 1 Unit4 1 Enterprise Resource Planning 2024-11-21 N/A 6.5 MEDIUM
Unit4 ERP through 7.9 allows XXE via ExecuteServerProcessAsynchronously.
CVE-2022-27434 1 Unit4 1 Teta 2024-11-21 N/A 9.8 CRITICAL
UNIT4 TETA Mobile Edition (ME) before 29.5.HF17 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.
CVE-2021-36234 1 Unit4 1 Mik.starlight 2024-11-21 2.1 LOW 5.5 MEDIUM
Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors.
CVE-2021-36233 1 Unit4 1 Mik.starlight 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path.
CVE-2021-36232 1 Unit4 1 Mik.starlight 2024-11-21 6.5 MEDIUM 8.8 HIGH
Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges.
CVE-2021-36231 1 Unit4 1 Mik.starlight 2024-11-21 9.0 HIGH 8.8 HIGH
Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects.
CVE-2015-2082 1 Unit4 1 Prosoft Hrms 2024-11-21 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Login.aspx in UNIT4 Prosoft HRMS before 8.14.330.43 allows remote attackers to inject arbitrary web script or HTML via the txtUserID parameter.
CVE-2015-1174 1 Unit4 1 Teta Web 2024-11-21 7.5 HIGH 9.8 CRITICAL
Session fixation vulnerability in Unit4 Polska TETA Web (formerly TETA Galactica) 22.62.3.4 and earlier allows remote attackers to hijack web sessions via a session id.
CVE-2015-1173 1 Unit4 1 Teta Web 2024-11-21 7.5 HIGH N/A
Unit4 Polska TETA Web (formerly TETA Galactica) 22.62.3.4 does not properly restrict access to the (1) Design Mode and (2) Debug Logger mode modules, which allows remote attackers to gain privileges via crafted "received parameters."