Filtered by vendor Kentico
Subscribe
Search
Total
6 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2022-32387 | 1 Kentico | 1 Kentico | 2022-07-25 | N/A | 7.5 HIGH |
| In Kentico before 13.0.66, attackers can achieve Denial of Service via a crafted request to the GetResource handler. | |||||
| CVE-2018-5282 | 1 Kentico | 1 Kentico Cms | 2020-08-24 | 7.2 HIGH | 7.8 HIGH |
| ** DISPUTED ** Kentico 9.0 through 11.0 has a stack-based buffer overflow via the SqlName, SqlPswd, Database, UserName, or Password field in a SilentInstall XML document. NOTE: the vendor disputes this issue because neither a buffer overflow nor a crash can be reproduced; also, reading XML documents is implemented exclusively with managed code within the Microsoft .NET Framework. | |||||
| CVE-2019-6242 | 1 Kentico | 1 Kentico | 2020-08-24 | 4.0 MEDIUM | 7.2 HIGH |
| ** DISPUTED ** Kentico v10.0.42 allows Global Administrators to read the cleartext SMTP Password by navigating to the SMTP configuration page. NOTE: the vendor considers this a best-practice violation but not a vulnerability. The vendor plans to fix it at a future time. | |||||
| CVE-2018-19453 | 1 Kentico | 1 Kentico Cms | 2019-04-11 | 6.8 MEDIUM | 8.8 HIGH |
| Kentico CMS before 11.0.45 allows unrestricted upload of a file with a dangerous type. | |||||
| CVE-2018-7046 | 1 Kentico | 1 Kentico Cms | 2019-02-28 | 9.0 HIGH | 7.2 HIGH |
| ** DISPUTED ** Arbitrary code execution vulnerability in Kentico 9 through 11 allows remote authenticated users to execute arbitrary operating system commands in a dynamic .NET code evaluation context via C# code in a "Pages -> Edit -> Template -> Edit template properties -> Layout" box. NOTE: the vendor has responded that there is intended functionality for authorized users to edit and update ascx code layout. | |||||
| CVE-2018-6843 | 1 Kentico | 1 Kentico Cms | 2018-04-12 | 6.5 MEDIUM | 7.2 HIGH |
| Kentico 10 before 10.0.50 and 11 before 11.0.3 has SQL injection in the administration interface. | |||||
