| CVE-2025-12547 |
|
High |
Oct 31, 2025 |
A vulnerability was identified in LogicalDOC Community Edition up to 9.2.1. This vulnerability affects unknown code of the file /login.jsp of the compo
more...
A vulnerability was identified in LogicalDOC Community Edition up to 9.2.1. This vulnerability affects unknown code of the file /login.jsp of the component Admin Login Page. Such manipulation leads to improper restriction of excessive authentication attempts. The attack can be executed remotely. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
less...
|
9.2.1, 9.2.0, 9.2, 9.1.1, 9.1, 9.0, 8.9.3, 8.9.2, 8.9.1, 8.9
|
| CVE-2025-12546 |
|
Medium |
Oct 31, 2025 |
A vulnerability was determined in LogicalDOC Community Edition up to 9.2.1. This affects an unknown part of the component API Key creation UI. This man
more...
A vulnerability was determined in LogicalDOC Community Edition up to 9.2.1. This affects an unknown part of the component API Key creation UI. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
less...
|
9.2.1, 9.2.0, 9.2, 9.1.1, 9.1, 9.0, 8.9.3, 8.9.2, 8.9.1, 8.9
|
| CVE-2025-11946 |
BDSA-2025-14101 |
Medium |
Oct 19, 2025 |
A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp o
more...
A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp of the component Add Contact Page. Performing manipulation of the argument First Name/Last Name/Company/Address/Phone/Mobile results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
less...
|
9.2.1, 9.2.0, 9.2, 9.1.1, 9.1, 9.0, 8.9.3, 8.9.2, 8.9.1, 8.9
|