Lucene search

K
RukovoditelRukovoditel

9 matches found

CVE
CVE
added 2020/04/16 7:15 p.m.71 views

CVE-2020-11819

In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.

9.8CVSS9.6AI score0.29397EPSS
CVE
CVE
added 2023/01/30 11:15 p.m.71 views

CVE-2022-48175

Rukovoditel v3.2.1 was discovered to contain a remote code execution (RCE) vulnerability in the component /rukovoditel/index.php?module=dashboard/ajax_request.

9.8CVSS9.8AI score0.05227EPSS
CVE
CVE
added 2022/12/02 8:15 p.m.66 views

CVE-2022-44945

Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the heading_field_id parameter.

9.8CVSS9.7AI score0.0029EPSS
CVE
CVE
added 2022/10/28 5:15 p.m.51 views

CVE-2022-43168

Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter.

9.8CVSS9.7AI score0.00313EPSS
CVE
CVE
added 2020/04/16 7:15 p.m.48 views

CVE-2020-11812

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the filters[0][value] or filters[1][value] parameter.

9.8CVSS9.7AI score0.00309EPSS
CVE
CVE
added 2020/04/16 7:15 p.m.45 views

CVE-2020-11820

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the entities_id parameter.

9.8CVSS9.7AI score0.00642EPSS
CVE
CVE
added 2020/04/16 7:15 p.m.42 views

CVE-2020-11815

In Rukovoditel 2.5.2, attackers can upload arbitrary file to the server by just changing the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs without the Maintenance Mode setting.

9.8CVSS9.5AI score0.00878EPSS
CVE
CVE
added 2020/04/16 7:15 p.m.40 views

CVE-2020-11816

Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the reports_id (POST) parameter.

9.8CVSS9.7AI score0.00642EPSS
CVE
CVE
added 2020/04/27 3:15 p.m.34 views

CVE-2020-11817

In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode setting.

9.8CVSS9.5AI score0.00873EPSS