Page 2 of 10 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Qlik NPrinting Designer through 21.14.3.0 creates a Temporary File in a Directory with Insecure Permissions. • https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0002.md • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows SSRF. La función GeoAnalytics de Qlik Sense versión April 2020 patch 4, permite un ataque de tipo SSRF • https://www.cyberiskvision.com/advisory • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured. Una vulnerabilidad en Qlik Sense Enterprise en Windows podría permitir a un atacante remoto enumerar cuentas de usuario de dominio. • https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531 https://csirt.divd.nl/CVE-2022-0564 https://csirt.divd.nl/DIVD-2021-00021 • CWE-203: Observable Discrepancy CWE-204: Observable Response Discrepancy •

CVSS: 8.2EPSS: 0%CPEs: 50EXPL: 0

An issue was discovered in QlikView Server before 11.20 SR19, 12.00 and 12.10 before 12.10 SR11, 12.20 before SR9, and 12.30 before SR2; and Qlik Sense Enterprise and Qlik Analytics Platform installations that lack these patch levels: February 2018 Patch 4, April 2018 Patch 3, June 2018 Patch 3, September 2018 Patch 4, November 2018 Patch 4, or February 2019 Patch 2. An authenticated user may be able to bypass intended file-read restrictions via crafted Browser requests. Fue encontrado un problema en QlikView Server versión anterior a 11.20 SR19, versión 12.00 y versión 12.10 anterior a 12.10 SR11, versión 12.20 anterior a SR9 y versión 12.30 anterior a SR2; y Qlik Sense Enterprise y Qlik Analytics Platform, ya que se presentan instalaciones q carecen de estos niveles de path: febrero de 2018 path 4, abril de 2018 path 3, junio de 2018 path 3, septiembre de 2018 path 4, noviembre de 2018 path 4 o febrero de 2019 path 2. Un usuario identificado puede ser capaz de omitir las restricciones de lectura de archivos previstas por medio de peticiónes de navegador creadas. • https://qliksupport.force.com/articles/000069985 • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 6.4EPSS: 5%CPEs: 1EXPL: 2

XML external entity (XXE) vulnerability in QlikTech Qlikview before 11.20 SR12 allows remote attackers to conduct server-side request forgery (SSRF) attacks and read arbitrary files via crafted XML data in a request to AccessPoint.aspx. Vulnerabilidad de XML external entity (XXE) en QlikTech Qlikview en versiones anteriores a 11.20 SR12, permite a atacantes remotos llevar a cabo ataques de falsificación de solicitud del lado del servidor (SSRF) y leer archivos arbitrarios a través de datos XML manipulados en una petición a AccessPoint.aspx. • https://www.exploit-db.com/exploits/38118 http://packetstormsecurity.com/files/133499/Qlikview-11.20-SR4-Blind-XXE-Injection.html http://www.securityfocus.com/archive/1/536411/100/0/threaded •