Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-4103
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.
0
Attacker Value
Unknown
CVE-2023-4102
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
0
Attacker Value
Unknown
CVE-2023-4101
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
0
Attacker Value
Unknown
CVE-2023-4100
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Allows an attacker to perform XSS attacks stored on certain resources. Exploiting this vulnerability can lead to a DoS condition, among other actions.
0
Attacker Value
Unknown
CVE-2023-4099
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The QSige Monitor application does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
0
Attacker Value
Unknown
CVE-2023-4098
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.
0
Attacker Value
Unknown
CVE-2023-4097
Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The file upload functionality is not implemented correctly and allows uploading of any type of file. As a prerequisite, it is necessary for the attacker to log into the application with a valid username.
0