Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Low

CVE-2014-9301

Disclosure Date: December 07, 2014 (last updated October 05, 2023)
Server-side request forgery (SSRF) vulnerability in the proxy servlet in Alfresco Community Edition before 5.0.a allows remote attackers to trigger outbound requests to intranet servers, conduct port scans, and read arbitrary files via a crafted URI in the endpoint parameter.
0
Attacker Value
Unknown

CVE-2020-18327

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
Cross Site Scripting (XSS) vulnerability exists in Alfresco Alfresco Community Edition v5.2.0 via the action parameter in the alfresco/s/admin/admin-nodebrowser API. Fixed in v6.2
Attacker Value
Unknown

CVE-2021-41791

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
An issue was discovered in Hyland org.alfresco:share through 7.0.0.2 and org.alfresco:community-share through 7.0. An evasion of the XSS filter for HTML input validation in the Alfresco Share User Interface leads to stored XSS that could be exploited by an attacker (given that he has privileges on the content collaboration features).
Attacker Value
Unknown

CVE-2021-41792

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
An issue was discovered in Hyland org.alfresco:alfresco-content-services through 6.2.2.18 and org.alfresco:alfresco-transform-services through 1.3. A crafted HTML file, once uploaded, could trigger an unexpected request by the transformation engine. The response to the request is not available to the attacker, i.e., this is blind SSRF.
Attacker Value
Unknown

CVE-2021-41790

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
An issue was discovered in Hyland org.alfresco:alfresco-content-services through 7.0.1.2. Script Action execution allows executing scripts uploaded outside of the Data Dictionary. This could allow a logged-in attacker to execute arbitrary code inside a sandboxed environment.
Attacker Value
Unknown

CVE-2020-15181

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
The Alfresco Reset Password add-on before version 1.2.0 relies on untrusted inputs in a security decision. Intruders can get admin's access to the system using the vulnerability in the project. Impacts all servers where this add-on is installed. The problem is fixed in version 1.2.0
Attacker Value
Unknown

CVE-2020-25728

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
The Reset Password add-on before 1.2.0 for Alfresco has a broken algorithm (involving an increment) that allows a malicious user to change any user's account password include the admin account.
Attacker Value
Unknown

CVE-2020-8777

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
Alfresco Enterprise before 5.2.7 and Alfresco Community before 6.2.0 (rb65251d6-b368) has XSS via a user profile photo, as demonstrated by a SCRIPT element in an SVG document.
Attacker Value
Unknown

CVE-2020-8776

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
Alfresco Enterprise before 5.2.7 and Alfresco Community before 6.2.0 (rb65251d6-b368) has XSS via the URL property of a file.
Attacker Value
Unknown

CVE-2020-8778

Disclosure Date: March 02, 2020 (last updated February 21, 2025)
Alfresco Enterprise before 5.2.7 and Alfresco Community before 6.2.0 (rb65251d6-b368) has XSS via an uploaded document, when the attacker has write access to a project.