Vulnerabilities > Openasset
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-14 | CVE-2020-28861 | Improper Neutralization of Formula Elements in a CSV File vulnerability in Openasset Digital Asset Management OpenAsset Digital Asset Management (DAM) 12.0.19 and earlier failed to implement access controls on /Stream/ProjectsCSV endpoint, allowing unauthenticated attackers to gain access to potentially sensitive project information stored by the application. | 5.3 |
2020-12-14 | CVE-2020-28860 | SQL Injection vulnerability in Openasset Digital Asset Management OpenAssetDigital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input, incorporating it into its SQL queries, allowing for authenticated blind SQL injection. | 8.8 |
2020-12-14 | CVE-2020-28859 | Cross-site Scripting vulnerability in Openasset Digital Asset Management OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for reflected cross-site scripting attacks. | 6.1 |
2020-12-14 | CVE-2020-28858 | Cross-Site Request Forgery (CSRF) vulnerability in Openasset Digital Asset Management OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly verify whether a request made to the application was intentionally made by the user, allowing for cross-site request forgery attacks on all user functions. | 8.8 |
2020-12-14 | CVE-2020-28857 | Cross-site Scripting vulnerability in Openasset Digital Asset Management OpenAsset Digital Asset Management (DAM) through 12.0.19, does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for stored cross-site scripting attacks. | 6.1 |
2020-12-14 | CVE-2020-28856 | Authentication Bypass by Spoofing vulnerability in Openasset Digital Asset Management OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly determine the HTTP request's originating IP address, allowing attackers to spoof it using X-Forwarded-For in the header, by supplying localhost address such as 127.0.0.1, effectively bypassing all IP address based access controls. | 7.5 |