Replyone

3 CVEs product

Monthly

CVE-2024-48907 HIGH POC This Week

Sematell ReplyOne 7.4.3.0 allows SSRF via the application server API. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SSRF Replyone
NVD
CVSS 3.1
7.5
EPSS
0.3%
CVE-2024-48906 MEDIUM POC This Month

Sematell ReplyOne 7.4.3.0 allows XSS via a ReplyDesk e-mail attachment name. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Replyone
NVD
CVSS 3.1
6.1
EPSS
0.2%
CVE-2024-48905 CRITICAL POC Act Now

Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Replyone
NVD
CVSS 3.1
9.1
EPSS
0.3%
CVE-2024-48907
EPSS 0% CVSS 7.5
HIGH POC This Week

Sematell ReplyOne 7.4.3.0 allows SSRF via the application server API. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SSRF Replyone
NVD
CVE-2024-48906
EPSS 0% CVSS 6.1
MEDIUM POC This Month

Sematell ReplyOne 7.4.3.0 allows XSS via a ReplyDesk e-mail attachment name. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Replyone
NVD
CVE-2024-48905
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Replyone
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy