Lucene search

K
ArcherirmArcher

6 matches found

CVE
CVE
added 2024/07/25 8:15 a.m.47 views

CVE-2024-41707

An issue was discovered in Archer Platform 6 before 2024.06. Authenticated users can achieve HTML content injection. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML code in a trusted application data store. When victim users access the data store ...

5.4CVSS6.9AI score0.00094EPSS
CVE
CVE
added 2024/10/22 5:15 p.m.38 views

CVE-2024-49208

Archer Platform 2024.03 before version 2024.08 is affected by an authorization bypass vulnerability related to supporting application files. A remote unprivileged attacker could potentially exploit this vulnerability to elevate their privileges and delete system icons.

5.9CVSS7AI score0.00084EPSS
CVE
CVE
added 2024/05/06 4:15 p.m.36 views

CVE-2024-34093

An issue was discovered in Archer Platform 6 before 2024.03. There is an X-Forwarded-For Header Bypass vulnerability. An unauthenticated attacker could potentially bypass intended whitelisting when X-Forwarded-For header is enabled.

5.3CVSS7AI score0.00141EPSS
CVE
CVE
added 2024/02/21 8:15 p.m.34 views

CVE-2024-26311

Archer Platform 6.x before 6.14 P2 HF1 (6.14.0.2.1) contains a reflected XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this by tricking a victim application user into supplying malicious JavaScript code to the vulnerable web application. This code is then...

5.7CVSS5.2AI score0.00139EPSS
CVE
CVE
added 2023/07/14 6:15 p.m.33 views

CVE-2023-37223

Cross Site Scripting (XSS) vulnerability in Archer Platform before v.6.13 and fixed in v.6.12.0.6 and v.6.13.0 allows a remote authenticated attacker to execute arbitrary code via a crafted malicious script.

5.4CVSS5.2AI score0.00526EPSS
CVE
CVE
added 2023/12/12 8:15 a.m.21 views

CVE-2023-48642

Archer Platform 6.x before 6.13 P2 (6.13.0.2) contains an authenticated HTML content injection vulnerability. A remote authenticated malicious Archer user could potentially exploit this to store malicious HTML code in a trusted application data store. When victim users access the data store through...

5.4CVSS5.4AI score0.00209EPSS