Maxum Rumpus 8.2.14

CPE Details

Maxum Rumpus 8.2.14
8.2.14
2021-03-08
23h43 +00:00
2021-04-08
17h38 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:maxum:rumpus:8.2.14:*:*:*:*:*:*:*

Informations

Vendor

maxum

Product

rumpus

Version

8.2.14

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-39187 2023-01-12 00h00 +00:00 Rumpus - FTP server version 9.0.7.1 has a Reflected cross-site scripting (RXSS) vulnerability through unspecified vectors.
6.8
Medium
CVE-2022-46367 2023-01-12 00h00 +00:00 Rumpus - FTP server Cross-site request forgery (CSRF) – Privilege escalation vulnerability that may allow privilege escalation.
8.8
High
CVE-2022-46368 2023-01-12 00h00 +00:00 Rumpus - FTP server version 9.0.7.1 Cross-site request forgery (CSRF) – vulnerability may allow unauthorized action on behalf of authenticated users.
8.8
High
CVE-2022-46369 2023-01-12 00h00 +00:00 Rumpus - FTP server version 9.0.7.1 Persistent cross-site scripting (PXSS) – vulnerability may allow inserting scripts into unspecified input fields.
6.8
Medium
CVE-2022-46370 2023-01-12 00h00 +00:00 Rumpus - FTP server version 9.0.7.1 Improper Token Verification– vulnerability may allow bypassing identity verification.
7.5
High
CVE-2020-27576 2021-03-08 20h13 +00:00 Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
5.4
Medium
CVE-2020-27575 2021-03-08 20h02 +00:00 Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
8.8
High
CVE-2020-27574 2021-03-08 19h57 +00:00 Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site request forgery (CSRF). If an authenticated user visits a malicious page, unintended actions could be performed in the web application as the authenticated user.
8.8
High