Vulnerabilities > Unit4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-08-31 | CVE-2021-36231 | Deserialization of Untrusted Data vulnerability in Unit4 Mik.Starlight 7.9.5.24363 Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects. | 9.0 |
2021-08-31 | CVE-2021-36232 | Missing Authorization vulnerability in Unit4 Mik.Starlight 7.9.5.24363 Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges. | 6.5 |
2021-08-31 | CVE-2021-36233 | Files or Directories Accessible to External Parties vulnerability in Unit4 Mik.Starlight 7.9.5.24363 The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path. | 4.0 |
2021-08-31 | CVE-2021-36234 | Use of Hard-coded Credentials vulnerability in Unit4 Mik.Starlight 7.9.5.24363 Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors. | 2.1 |
2017-08-02 | CVE-2015-1174 | Session Fixation vulnerability in Unit4 Teta web Session fixation vulnerability in Unit4 Polska TETA Web (formerly TETA Galactica) 22.62.3.4 and earlier allows remote attackers to hijack web sessions via a session id. | 7.5 |
2015-09-16 | CVE-2015-1173 | Improper Access Control vulnerability in Unit4 Teta web Unit4 Polska TETA Web (formerly TETA Galactica) 22.62.3.4 does not properly restrict access to the (1) Design Mode and (2) Debug Logger mode modules, which allows remote attackers to gain privileges via crafted "received parameters." | 7.5 |
2015-02-25 | CVE-2015-2082 | Cross-site Scripting vulnerability in Unit4 Prosoft Hrms 8.14.230.47 Cross-site scripting (XSS) vulnerability in Login.aspx in UNIT4 Prosoft HRMS before 8.14.330.43 allows remote attackers to inject arbitrary web script or HTML via the txtUserID parameter. | 4.3 |