Vulnerabilities > Openasset

DATE CVE VULNERABILITY TITLE RISK
2020-12-14 CVE-2020-28861 Improper Neutralization of Formula Elements in a CSV File vulnerability in Openasset Digital Asset Management
OpenAsset Digital Asset Management (DAM) 12.0.19 and earlier failed to implement access controls on /Stream/ProjectsCSV endpoint, allowing unauthenticated attackers to gain access to potentially sensitive project information stored by the application.
network
low complexity
openasset CWE-1236
5.0
2020-12-14 CVE-2020-28860 SQL Injection vulnerability in Openasset Digital Asset Management
OpenAssetDigital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input, incorporating it into its SQL queries, allowing for authenticated blind SQL injection.
network
low complexity
openasset CWE-89
6.5
2020-12-14 CVE-2020-28859 Cross-site Scripting vulnerability in Openasset Digital Asset Management
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for reflected cross-site scripting attacks.
network
openasset CWE-79
4.3
2020-12-14 CVE-2020-28858 Cross-Site Request Forgery (CSRF) vulnerability in Openasset Digital Asset Management
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly verify whether a request made to the application was intentionally made by the user, allowing for cross-site request forgery attacks on all user functions.
network
openasset CWE-352
6.8
2020-12-14 CVE-2020-28857 Cross-site Scripting vulnerability in Openasset Digital Asset Management
OpenAsset Digital Asset Management (DAM) through 12.0.19, does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for stored cross-site scripting attacks.
network
openasset CWE-79
4.3
2020-12-14 CVE-2020-28856 Authentication Bypass by Spoofing vulnerability in Openasset Digital Asset Management
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly determine the HTTP request's originating IP address, allowing attackers to spoof it using X-Forwarded-For in the header, by supplying localhost address such as 127.0.0.1, effectively bypassing all IP address based access controls.
network
low complexity
openasset CWE-290
5.0