Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Openasset Subscribe
Filtered by product Digital Asset Management
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-28860 1 Openasset 1 Digital Asset Management 2020-12-15 6.5 MEDIUM 8.8 HIGH
OpenAssetDigital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input, incorporating it into its SQL queries, allowing for authenticated blind SQL injection.
CVE-2020-28861 1 Openasset 1 Digital Asset Management 2020-12-15 5.0 MEDIUM 5.3 MEDIUM
OpenAsset Digital Asset Management (DAM) 12.0.19 and earlier failed to implement access controls on /Stream/ProjectsCSV endpoint, allowing unauthenticated attackers to gain access to potentially sensitive project information stored by the application.
CVE-2020-28856 1 Openasset 1 Digital Asset Management 2020-12-15 5.0 MEDIUM 7.5 HIGH
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly determine the HTTP request's originating IP address, allowing attackers to spoof it using X-Forwarded-For in the header, by supplying localhost address such as 127.0.0.1, effectively bypassing all IP address based access controls.
CVE-2020-28858 1 Openasset 1 Digital Asset Management 2020-12-14 6.8 MEDIUM 8.8 HIGH
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly verify whether a request made to the application was intentionally made by the user, allowing for cross-site request forgery attacks on all user functions.
CVE-2020-28859 1 Openasset 1 Digital Asset Management 2020-12-14 4.3 MEDIUM 6.1 MEDIUM
OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for reflected cross-site scripting attacks.
CVE-2020-28857 1 Openasset 1 Digital Asset Management 2020-12-14 4.3 MEDIUM 6.1 MEDIUM
OpenAsset Digital Asset Management (DAM) through 12.0.19, does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for stored cross-site scripting attacks.