Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2020-24982
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
An issue was discovered in Quadbase ExpressDashboard (EDAB) 7 Update 9. It allows CSRF. An attacker may be able to trick an authenticated user into changing the email address associated with their account.
0
Attacker Value
Unknown
CVE-2020-24985
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
An issue was discovered in Quadbase EspressReports ES 7 Update 9. An authenticated user is able to navigate to the MenuPage section of the application, and change the frmsrc parameter value to retrieve and execute external files or payloads.
0
Attacker Value
Unknown
CVE-2020-24984
Disclosure Date: March 11, 2021 (last updated February 22, 2025)
An issue was discovered in Quadbase EspressReports ES 7 Update 9. It allows CSRF, whereby an attacker may be able to trick an authenticated admin level user into uploading malicious files to the web server.
0
Attacker Value
Unknown
CVE-2020-24983
Disclosure Date: March 11, 2021 (last updated February 22, 2025)
An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML file that houses a POST request made to the DashboardBuilder within the target web application. This request will utilise the target admin session and perform the authenticated request (to change the Dashboard name) as if the victim had done so themselves, aka CSRF.
0
Attacker Value
Unknown
CVE-2019-9958
Disclosure Date: June 24, 2019 (last updated February 15, 2024)
CSRF within the admin panel in Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to escalate privileges, or create new admin accounts by crafting a malicious web page that issues specific requests, using a target admin's session to process their requests.
0
Attacker Value
Unknown
CVE-2019-9957
Disclosure Date: June 24, 2019 (last updated February 15, 2024)
Stored XSS within Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The XSS payload is stored by creating a new user account, and setting the username to an XSS payload. The stored payload can then be triggered by accessing the "Set Security Levels" or "View User/Group Relationships" page. If the attacker does not currently have permission to create a new user, another vulnerability such as CSRF must be exploited first.
0