CVE-2022-45165
- EPSS 0.08%
- Veröffentlicht 10.01.2023 21:15:12
- Zuletzt bearbeitet 30.05.2025 16:15:33
An issue was discovered in Archibus Web Central 2022.03.01.107. A service exposed by the application accepts a user-controlled parameter that is used to create an SQL query. It causes this service to be prone to SQL injection.
CVE-2022-28862
- EPSS 0.25%
- Veröffentlicht 25.05.2022 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:58:05
In Archibus Web Central before 26.2, multiple SQL Injection vulnerabilities occur in dwr/call/plaincall/workflow.runWorkflowRule.dwr. Through the injection of arbitrary SQL statements, a potential attacker can modify query syntax and perform unauthor...
CVE-2021-41553
- EPSS 0.47%
- Veröffentlicht 05.10.2021 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:24
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), the Web Application in /archibus/login.axvw assign a session token that could be already in use by another user. It was therefore possible to access the application through a user whose creden...
CVE-2021-41554
- EPSS 0.29%
- Veröffentlicht 05.10.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:24
ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus...
CVE-2021-41555
- EPSS 0.4%
- Veröffentlicht 05.10.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:24
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application with...