OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover.
7.5CVSS
7.4AI Score
0.001EPSS
OcoMon v4.0 was discovered to contain a SQL injection vulnerability via the cod parameter at download.php.
9.8CVSS
9.8AI Score
0.002EPSS
OcoMon v4.0 was discovered to contain a SQL injection vulnerability via the cod parameter at showImg.php.
9.8CVSS
9.8AI Score
0.002EPSS
An information disclosure vulnerability in the component users-grid-data.php of Ocomon before v4.0.1 allows attackers to obtain sensitive information such as e-mails and usernames.
7.5CVSS
7AI Score
0.001EPSS
A local file inclusion vulnerability via the lang parameter in OcoMon before v4.0.1 allows attackers to execute arbitrary code by supplying a crafted PHP file.
8.8CVSS
8.6AI Score
0.001EPSS
A vulnerability, which was classified as problematic, has been found in OcoMon 4.0RC1/4.0/5.0RC1. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initi...
4.3CVSS
4.4AI Score
0.0004EPSS