Filtered by vendor Fairsketch Subscriptions
Filtered by product Rise Crm Framework Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-41101 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.
CVE-2025-41102 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/events/save'.
CVE-2025-41103 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'reply_message' in '/messages/reply'.
CVE-2025-41104 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'custom_field_1' in '/estimate_requests/save_estimate_request'.
CVE-2025-41105 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/tickets/save'.
CVE-2025-41106 1 Fairsketch 2 Rise Crm Framework, Rise Ultimate Project Manager 2025-11-17 5.4 Medium
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'first_name' in '/clients/save_contact/'.