Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2022-30519

Disclosure Date: December 29, 2022 (last updated October 08, 2023)
XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field.
Attacker Value
Unknown

CVE-2022-28365

Disclosure Date: April 09, 2022 (last updated February 23, 2025)
Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture, and file/directory details.
Attacker Value
Unknown

CVE-2022-28364

Disclosure Date: April 09, 2022 (last updated February 23, 2025)
Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/rlmswitchr_process file parameter via GET. Authentication is required.
Attacker Value
Unknown

CVE-2022-28363

Disclosure Date: April 09, 2022 (last updated February 23, 2025)
Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/login_process username parameter via GET. No authentication is required.
Attacker Value
Unknown

CVE-2021-45422

Disclosure Date: January 13, 2022 (last updated February 23, 2025)
Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability in the /goform/activate_process "count" parameter via GET. No authentication is required.
Attacker Value
Unknown

CVE-2021-44155

Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue was discovered in /goform/login_process in Reprise RLM 14.2. When an attacker attempts to login, the response if a username is valid includes Login Failed, but does not include this string if the username is invalid. This allows an attacker to enumerate valid users.
Attacker Value
Unknown

CVE-2021-44154

Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload to /goform/edit_opt, which will then be triggered when running the diagnostics (via /goform/diagnostics_doit), resulting in a buffer overflow.
Attacker Value
Unknown

CVE-2021-44153

Disclosure Date: December 13, 2021 (last updated October 07, 2023)
An issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables, as demonstrated by an ISV demo "C:\Windows\System32\calc.exe" entry. An attacker can exploit this to run a malicious binary on startup, or when triggering the Reread/Restart Servers function on the webserver. (Exploitation does not require CVE-2018-15573, because the license file is meant to be changed in the application.)
Attacker Value
Unknown

CVE-2021-44151

Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to request that same page, setting a random value for the cookie. If any user has an active session, the page should return with the authorized content, when a valid cookie value is hit.