Artica

Integria Ims

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Published 07.10.2021 16:15:09
  • Last modified 21.11.2024 06:22:34

Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS).

  • EPSS 0.61%
  • Published 07.10.2021 16:15:08
  • Last modified 21.11.2024 06:22:34

Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to ...

  • EPSS 1.59%
  • Published 07.10.2021 14:15:08
  • Last modified 21.11.2024 06:22:34

Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability.

  • EPSS 0.43%
  • Published 16.08.2019 13:15:11
  • Last modified 21.11.2024 04:28:02

filemgr.php in Artica Integria IMS 5.0.86 allows index.php?sec=wiki&sec2=operation/wiki/wiki&action=upload arbitrary file upload.

Exploit
  • EPSS 0.66%
  • Published 20.12.2018 15:29:00
  • Last modified 21.11.2024 03:40:24

Artica Integria IMS version 5.0 MR56 Package 58, likely earlier versions contains a CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Password recovery process, line 45 of general/password_recovery.php that can result ...

Exploit
  • EPSS 0.32%
  • Published 18.12.2018 22:29:05
  • Last modified 21.11.2024 03:58:38

Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.

Exploit
  • EPSS 0.65%
  • Published 17.12.2018 19:29:00
  • Last modified 21.11.2024 03:58:38

Artica Integria IMS 5.0.83 has XSS via the search_string parameter.