Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): AppSpace
- Search Type: Search All
- CPE Name Search: false
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-27990 |
Appspace 6.2.4 is vulnerable to a broken authentication mechanism where pages such as /medianet/mail.aspx can be called directly and the framework is exposed with layouts, menus and functionalities. Published: April 14, 2021; 10:15:13 AM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-27989 |
Appspace 6.2.4 is vulnerable to stored cross-site scripting (XSS) in multiple parameters within /medianet/sgcontentset.aspx. Published: April 14, 2021; 8:15:12 AM -0400 |
V3.1: 5.4 MEDIUM V2.0: 3.5 LOW |
CVE-2021-27670 |
Appspace 6.2.4 allows SSRF via the api/v1/core/proxy/jsonprequest url parameter. Published: February 24, 2021; 8:15:13 PM -0500 |
V3.1: 9.8 CRITICAL V2.0: 7.5 HIGH |
CVE-2021-27564 |
A stored XSS issue exists in Appspace 6.2.4. After a user is authenticated and enters an XSS payload under the groups section of the network tab, it is stored as the group name. Whenever another member visits that group, this payload executes. Published: February 22, 2021; 12:15:12 PM -0500 |
V3.1: 5.4 MEDIUM V2.0: 3.5 LOW |
CVE-2020-5393 |
In Appspace On-Prem through 7.1.3, an adversary can steal a session token via XSS. Published: January 07, 2020; 11:15:12 AM -0500 |
V3.1: 6.1 MEDIUM V2.0: 4.3 MEDIUM |