Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2023-4103

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.
Attacker Value
Unknown

CVE-2023-4102

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
Attacker Value
Unknown

CVE-2023-4101

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
Attacker Value
Unknown

CVE-2023-4100

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
Allows an attacker to perform XSS attacks stored on certain resources. Exploiting this vulnerability can lead to a DoS condition, among other actions.
Attacker Value
Unknown

CVE-2023-4099

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The QSige Monitor application does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.
Attacker Value
Unknown

CVE-2023-4098

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.
Attacker Value
Unknown

CVE-2023-4097

Disclosure Date: October 03, 2023 (last updated February 25, 2025)
The file upload functionality is not implemented correctly and allows uploading of any type of file. As a prerequisite, it is necessary for the attacker to log into the application with a valid username.