4 results (0.007 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

QPR Portal before 2012.2.1 allows remote attackers to modify or delete notes via a direct request. QPR Portal anterior a 2012.2.1 permite a atacantes remotos modificar o eliminar notas a través de una solicitud directa. • http://www.kb.cert.org/vuls/id/546340 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in QPR Portal 2014.1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the RID parameter. Vulnerabilidad de XSS en QPR Portal 2014.1.1 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro RID. • http://www.kb.cert.org/vuls/id/546340 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the note-creation page in QPR Portal 2014.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) body field. Múltiples vulnerabilidades de XSS en la página de la creación de notas en QPR Portal 2014.1.1 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo (1) title o (2) body. • http://www.kb.cert.org/vuls/id/546340 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

download.aspx in Douran Portal 3.9.7.8 allows remote attackers to obtain source code of arbitrary files under the web root via (1) a trailing ".", (2) a trailing space, or (3) mixed case in the FileNameAttach parameter. download.aspx en Douran Portal v3.9.7.8 permite a atacantes remotos obtener el código fuente de archivos de su elección en la raíz web a través de (1) una final ".", (2) un espacio al final, o (3) mayúsculas y minúsculas en el parámetro FileNameAttach. • https://www.exploit-db.com/exploits/17011 http://osvdb.org/71250 http://secunia.com/advisories/43792 http://securityreason.com/securityalert/8180 http://soroush.secproject.com/blog/2011/01/unrestricted_file_download_v1_0 http://www.exploit-db.com/exploits/17011 http://www.securityfocus.com/archive/1/517085/100/0/threaded http://www.securityfocus.com/bid/46927 https://exchange.xforce.ibmcloud.com/vulnerabilities/66177 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •