Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
logicaldoc enterprise vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv4
CVE-2024-12019
The API used to interact with documents in the application contains a flaw that allows an authenticated malicious user to read the contents of files on the underlying operating system. An account with ‘read’ and ‘download’ privileges on at least one existi...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
8.7
CVSSv4
CVE-2024-12245
Logout functionality contains a blind SQL injection that can be exploited by unauthenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entri...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
8.7
CVSSv4
CVE-2024-54445
Login functionality contains a blind SQL injection that can be exploited by unauthenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entrie...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
7.1
CVSSv4
CVE-2024-54446
Document history functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack there...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
7.1
CVSSv4
CVE-2024-54447
Saved search functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof e...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
8.6
CVSSv4
CVE-2024-54448
The Automation Scripting functionality can be exploited by malicious users to run arbitrary system commands on the underlying operating system. An account with administrator privileges or that has been explicitly granted access to use Automation Scripting is needed to carry out t...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
8.7
CVSSv4
CVE-2024-54449
The API used to interact with documents in the application contains two endpoints with a flaw that allows an authenticated malicious user to write a file with controlled contents to an arbitrary location on the underlying file system. This can be used to facilitate RCE. An accoun...
Logicaldoc Logicaldoc Community
Logicaldoc Logicaldoc Enterprise
6.4
CVSSv4
CVE-2024-12020
There is a reflected cross-site scripting (XSS) within JSP files used to control application appearance. An unauthenticated attacker could deceive a user into clicking a crafted link to trigger the vulnerability. Stealing the session cookie is not possible due to cookie security ...
Logicaldoc Logicaldoc Enterprise
5.4
CVSSv3
CVE-2022-47417
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document file name.
Logicaldoc Logicaldoc 8.7.3
Logicaldoc Logicaldoc 8.8.2
5.4
CVSSv3
CVE-2022-47418
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document version comments.
Logicaldoc Logicaldoc 8.7.3
Logicaldoc Logicaldoc 8.8.2
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-46656
unknown
CVE-2025-46577
CVE-2025-32979
paicoding
XPath injection
hackmd
CVE-2025-3643
opplus
CSRF
local users
CVE-2025-32433
CVE-2025-32432
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »