Loading HuntDB...

OX Software GmbH

1 Product 33 CVEs

CVE Severity Distribution (All Time)

Critical
0
High
7
Medium
22
Low
4

Timeline Overview

Last 30 Days 0 CVEs
Last 6 Months 0 CVEs
Last Year 0 CVEs

Recent CVEs

View all
CVE-2023-29047 MEDIUM 1 year, 10 months ago

Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL sta…

CVE-2023-29046 MEDIUM 1 year, 10 months ago

Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were l…

CVE-2023-29045 MEDIUM 1 year, 10 months ago

Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected…

CVE-2023-29044 MEDIUM 1 year, 10 months ago

Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that wou…

CVE-2023-29043 MEDIUM 1 year, 10 months ago

Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editi…

CVE-2023-26456 MEDIUM 1 year, 10 months ago

Users were able to set an arbitrary "product name" for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user int…

CVE-2023-26455 MEDIUM 1 year, 10 months ago

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse th…

CVE-2023-26454 HIGH 1 year, 10 months ago

Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at l…

CVE-2023-26453 HIGH 1 year, 10 months ago

Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least a…

CVE-2023-26452 HIGH 1 year, 10 months ago

Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerabi…