Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2022-47418

Disclosure Date: February 07, 2023 (last updated October 08, 2023)
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document version comments.
Attacker Value
Unknown

CVE-2022-47417

Disclosure Date: February 07, 2023 (last updated October 08, 2023)
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the document file name.
Attacker Value
Unknown

CVE-2022-47416

Disclosure Date: February 07, 2023 (last updated October 08, 2023)
LogicalDOC Enterprise is vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app chat system.
Attacker Value
Unknown

CVE-2022-47415

Disclosure Date: February 07, 2023 (last updated October 08, 2023)
LogicalDOC Enterprise and Community Edition (CE) are vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app messaging system (both subject and message bodies).
Attacker Value
Unknown

CVE-2020-13542

Disclosure Date: December 03, 2020 (last updated February 22, 2025)
A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.
Attacker Value
Unknown

CVE-2020-10366

Disclosure Date: April 08, 2020 (last updated February 21, 2025)
LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365.
Attacker Value
Unknown

CVE-2020-10365

Disclosure Date: March 18, 2020 (last updated February 21, 2025)
LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This list could be filtered by modifying some of the parameters. Some of them are not properly sanitized which could allow an authenticated attacker to perform arbitrary queries to the database.
Attacker Value
Unknown

CVE-2020-9423

Disclosure Date: March 18, 2020 (last updated February 21, 2025)
LogicalDoc before 8.3.3 could allow an attacker to upload arbitrary files, leading to command execution or retrieval of data from the database. LogicalDoc provides a functionality to add documents. Those documents could then be used for multiple tasks, such as version control, shared among users, applying tags, etc. This functionality could be abused by an unauthenticated attacker to upload an arbitrary file in a restricted folder. This would lead to the executions of malicious commands with root privileges.
Attacker Value
Unknown

CVE-2019-9723

Disclosure Date: May 30, 2019 (last updated November 27, 2024)
LogicalDOC Community Edition 8.x before 8.2.1 has a path traversal vulnerability that allows reading arbitrary files and the creation of directories, in the class PluginRegistry.
0
Attacker Value
Unknown

CVE-2017-1000021

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
LogicalDoc Community Edition 7.5.3 and prior is vulnerable to XXE when indexing XML documents.
0