Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
nchsoftware vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2021-37445
In NCH Quorum v2.03 and previous versions, an authenticated user can use directory traversal via logprop?file=/.. for file reading.
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37463
In NCH Quorum v2.03 and previous versions, XSS exists via User Display Name (stored).
Nchsoftware Quorum
4
CVSSv2
CVE-2021-37446
In NCH Quorum v2.03 and previous versions, an authenticated user can use directory traversal via documentprop?file=/.. for file reading.
Nchsoftware Quorum
5.5
CVSSv2
CVE-2021-37447
In NCH Quorum v2.03 and previous versions, an authenticated user can use directory traversal via documentdelete?file=/.. for file deletion.
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37464
In NCH Quorum v2.03 and previous versions, XSS exists via Conference Description (stored).
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37465
In NCH Quorum v2.03 and previous versions, XSS exists via /uploaddoc?id= (reflected).
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37466
In NCH Quorum v2.03 and previous versions, XSS exists via /conference?id= (reflected).
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37467
In NCH Quorum v2.03 and previous versions, XSS exists via /conferencebrowseuploadfile?confid= (reflected).
Nchsoftware Quorum
3.5
CVSSv2
CVE-2021-37470
In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript.
Nchsoftware Webdictate
3.5
CVSSv2
CVE-2021-37450
Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and previous versions via /ogmprop?id= (reflected).
Nchsoftware Ivm Attendant
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »