Vulnerabilities (CVE)

Filtered by vendor Businessdnasolutions Subscribe
Filtered by product Topease
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-42115 1 Businessdnasolutions 1 Topease 2023-12-10 6.4 MEDIUM 9.1 CRITICAL
Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an unauthenticated remote attacker to escalate privileges from unauthenticated to authenticated user via stealing and injecting the session- independent and static cookie UID.
CVE-2021-42121 1 Businessdnasolutions 1 Topease 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on an object’s date attribute(s) allows an authenticated remote attacker with Object Modification privileges to insert an unexpected format into date fields, which leads to breaking the object page that the date field is present.
CVE-2021-42118 1 Businessdnasolutions 1 Topease 2023-12-10 3.5 LOW 5.4 MEDIUM
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Structure Component allows an authenticated remote attacker with Object Modification privileges to inject arbitrary HTML and JavaScript code in an object attribute, which is then rendered in the Structure Component, to alter the intended functionality and steal cookies, the latter allowing for account takeover.
CVE-2021-42123 1 Businessdnasolutions 1 Topease 2023-12-10 6.5 MEDIUM 8.8 HIGH
Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to upload files with any file type, enabling client-side attacks.
CVE-2021-42544 1 Businessdnasolutions 1 Topease 2023-12-10 7.5 HIGH 9.8 CRITICAL
Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on the Login Form allows an unauthenticated remote attacker to perform multiple login attempts, which facilitates gaining privileges.
CVE-2021-42117 1 Businessdnasolutions 1 Topease 2023-12-10 3.5 LOW 5.4 MEDIUM
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an authenticated remote attacker with Object Modification privileges to insert arbitrary HTML without code execution.
CVE-2021-42119 1 Businessdnasolutions 1 Topease 2023-12-10 3.5 LOW 5.4 MEDIUM
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Search Functionality allows authenticated users with Object Modification privileges to inject arbitrary HTML and JavaScript in object attributes, which is then rendered in the Search Functionality, to alter the intended functionality and steal cookies, the latter allowing for account takeover.
CVE-2021-42122 1 Businessdnasolutions 1 Topease 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on an object’s attributes with numeric format allows an authenticated remote attacker with Object Modification privileges to insert an unexpected format, which makes the affected attribute non-editable.
CVE-2021-42120 1 Businessdnasolutions 1 Topease 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on all object attributes allows an authenticated remote attacker with Object Modification privileges to insert arbitrarily long strings, eventually leading to exhaustion of the underlying resource.
CVE-2021-42116 1 Businessdnasolutions 1 Topease 2023-12-10 4.0 MEDIUM 4.3 MEDIUM
Incorrect Access Control in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an authenticated remote attacker to view the Shape Editor and Settings, which are functionality for higher privileged users, via identifying said components in the front-end source code or other means.