📦 Tim Flow
by Tim Solutions
🔍 What is Tim Flow?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A privilege escalation vulnerability in TIM Solution GmbH's TIM BPM Suite and TIM FLOW allows remote attackers to gain elevated privileges through specially crafted HTTP requests. This affects organiz...
This vulnerability in TIM BPM Suite & TIM FLOW allows remote attackers to escalate privileges by exploiting weak MD5 password hashes stored by the application. Organizations using affected versions of...
Multiple Hibernate Query Language injection vulnerabilities in TIM BPM Suite/TIM FLOW allow low-privileged authenticated users to extract other users' passwords and access sensitive data. This affects...
Multiple SQL injection vulnerabilities in TIM BPM Suite/TIM FLOW allow authenticated users (both low-privileged and administrative) to execute arbitrary SQL commands and access database content. This ...
Multiple authorization bypass vulnerabilities in TIM BPM Suite/TIM FLOW allow low-privileged users to access sensitive data and modify restricted content. This affects all users of these workflow auto...