Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity.
openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Activity Search Criteria-Activity Number.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Product Configuration Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Product Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Category Creation Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Milestone Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Saved Search Creation.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Group Name Field.
An issue in openCRX v.5.2.2 allows a remote attacker to read internal files and execute server side request forgery attack via insecure DocumentBuilderFactory.
OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
OpenCRX suffers from an unverified password change vulnerability.