Filtered by vendor Objectplanet
Subscriptions
Total
9 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-13871 | 1 Objectplanet | 1 Opinio | 2025-12-04 | 8.8 High |
| Cross-Site Request Forgery (CSRF) in the resource-management feature of ObjectPlanet Opinio 7.26 rev12562 allows to upload files on behalf of the connected users and then access such files without authentication. | ||||
| CVE-2025-13872 | 1 Objectplanet | 1 Opinio | 2025-12-04 | 9.1 Critical |
| Blind Server-Side Request Forgery (SSRF) in the survey-import feature of ObjectPlanet Opinio 7.26 rev12562 on Web-based platforms allows an attacker to force the server to perform HTTP GET requests via crafted import requests to an arbitrary destination. | ||||
| CVE-2025-13873 | 1 Objectplanet | 1 Opinio | 2025-12-04 | 5.4 Medium |
| Stored Cross-Site Scripting (XSS) in the survey-import feature of ObjectPlanet Opinio 7.26 rev12562 on web application allows an attacker to inject arbitrary JavaScript code, which executes in the browsing context of any visitor accessing the compromised survey. | ||||
| CVE-2023-4472 | 1 Objectplanet | 1 Opinio | 2025-06-11 | 9.8 Critical |
| Objectplanet Opinio version 7.22 and prior uses a cryptographically weak pseudo-random number generator (PRNG) coupled to a predictable seed, which could lead to an unauthenticated account takeover of any user on the application. | ||||
| CVE-2017-10798 | 1 Objectplanet | 1 Opinio | 2025-04-20 | N/A |
| In ObjectPlanet Opinio before 7.6.4, there is XSS. | ||||
| CVE-2020-26806 | 1 Objectplanet | 1 Opinio | 2024-11-21 | 8.8 High |
| admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code. | ||||
| CVE-2020-26565 | 1 Objectplanet | 1 Opinio | 2024-11-21 | 7.5 High |
| ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data. | ||||
| CVE-2020-26564 | 1 Objectplanet | 1 Opinio | 2024-11-21 | 6.5 Medium |
| ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFile'] URI. The XXE can then be triggered at a admin/preview.do?action=previewSurvey&surveyId= URI. | ||||
| CVE-2020-26563 | 1 Objectplanet | 1 Opinio | 2024-11-21 | 6.1 Medium |
| ObjectPlanet Opinio before 7.14 allows reflected XSS via the survey/admin/surveyAdmin.do?action=viewSurveyAdmin query string. (There is also stored XSS if input to survey/admin/*.do is accepted from untrusted users.) | ||||
Page 1 of 1.