Lucene search

K
Group-officeGroup Office

7 matches found

CVE
CVE
added 2024/01/18 9:15 p.m.203 views

CVE-2024-22418

Group-Office is an enterprise CRM and groupware tool. Affected versions are subject to a vulnerability which is present in the file upload mechanism of Group Office. It allows an attacker to execute arbitrary JavaScript code by embedding it within a file's name. For instance, using a filename such ...

6.5CVSS5.9AI score0.00236EPSS
CVE
CVE
added 2024/02/01 4:15 a.m.194 views

CVE-2024-23941

Cross-site scripting vulnerability exists in Group Office prior to v6.6.182, prior to v6.7.64 and prior to v6.8.31, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.

5.4CVSS5.3AI score0.00103EPSS
CVE
CVE
added 2023/11/07 6:15 p.m.42 views

CVE-2023-46730

Group-Office is an enterprise CRM and groupware tool. In affected versions there is full Server-Side Request Forgery (SSRF) vulnerability in the /api/upload.php endpoint. The /api/upload.php endpoint does not filter URLs which allows a malicious user to cause the server to make resource requests to...

8.8CVSS8AI score0.0019EPSS
CVE
CVE
added 2021/04/14 5:15 p.m.36 views

CVE-2020-35419

Cross Site Scripting (XSS) in Group Office CRM 6.4.196 via the SET_LANGUAGE parameter.

6.1CVSS6AI score0.00201EPSS
CVE
CVE
added 2023/04/27 1:15 a.m.34 views

CVE-2023-25292

Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie.

6.1CVSS6.1AI score0.00244EPSS
CVE
CVE
added 2021/04/14 5:15 p.m.32 views

CVE-2020-35418

Cross Site Scripting (XSS) in the contact page of Group Office CRM 6.4.196 by uploading a crafted svg file.

5.4CVSS5.2AI score0.00172EPSS
CVE
CVE
added 2021/04/14 5:15 p.m.30 views

CVE-2021-28060

A Server-Side Request Forgery (SSRF) vulnerability in Group Office 6.4.196 allows a remote attacker to forge GET requests to arbitrary URLs via the url parameter to group/api/upload.php.

5.3CVSS5.3AI score0.00276EPSS