Seeddms

Seeddms

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 21.05.2025 17:15:58
  • Zuletzt bearbeitet 21.05.2025 20:24:58

A stored cross-site scripting (XSS) vulnerability exists in SeedDMS 6.0.32. This vulnerability allows an attacker to inject malicious JavaScript payloads by creating a document with an XSS payload as the document name.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 21.05.2025 00:00:00
  • Zuletzt bearbeitet 13.06.2025 15:49:20

A vulnerability in SeedDMS 6.0.32 allows an attacker with admin privileges to execute arbitrary PHP code by exploiting the zip import functionality in the Extension Manager.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 28.02.2025 16:15:39
  • Zuletzt bearbeitet 09.07.2025 19:32:02

A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the "Add Category" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 04.10.2024 17:15:17
  • Zuletzt bearbeitet 03.07.2025 14:13:31

A stored cross-site scripting (XSS) vulnerability in SeedDMS v6.0.28 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter in the Calendar page.

  • EPSS 0.08%
  • Veröffentlicht 24.07.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 06:19:30

A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

  • EPSS 0.07%
  • Veröffentlicht 20.07.2023 20:15:10
  • Zuletzt bearbeitet 21.11.2024 06:19:30

SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 07.06.2023 01:15:38
  • Zuletzt bearbeitet 21.11.2024 06:08:33

An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file.

Exploit
  • EPSS 0.41%
  • Veröffentlicht 08.12.2022 20:15:10
  • Zuletzt bearbeitet 23.04.2025 16:15:27

Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.

Exploit
  • EPSS 0.56%
  • Veröffentlicht 06.06.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:57:24

SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu

Exploit
  • EPSS 1.28%
  • Veröffentlicht 06.06.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:57:24

SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote syst...