
CVE-2012-1903
https://notcve.org/view.php?id=CVE-2012-1903
13 Feb 2020 — XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter. Una vulnerabilidad de tipo XSS en Telligent Community versión 5.6.583.20496, por medio de un archivo flash y relacionado con el parámetro allowScriptAccess. • https://web.archive.org/web/20160317182930/http://www.cloudscan.me/2013/03/cve-2012-1903-stored-xss-javascript.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-16235
https://notcve.org/view.php?id=CVE-2018-16235
23 Oct 2018 — Telligent Community 6.x, 7.x, 8.x, 9.x before 9.2.10.11796, 10.1.x before 10.1.10.11792, and 10.2.x before 10.2.3.4725 has XSS via the Feed RSS widget. Telligent Community versión 6.x,versión 7.x,versión 8.x, versión 9.x anterior a 9.2.10.11796,versión 10.1.x anterior a 10.1.10.11792, y versión 10.2.x anterior a 10.2.3.4725 tiene una vulnerabilidad de tipo Cross-Site Scripting (XSS) por medio del widget Feed RSS. • https://community.telligent.com/community/10/w/user-documentation/61996/release-notes • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2007-0538
https://notcve.org/view.php?id=CVE-2007-0538
29 Jan 2007 — Telligent Community Server 2.1 and earlier allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to (1) a large file, which triggers a long download session without a timeout constraint; or (2) a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. Telligent Community Server 2.1 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotami... • http://osvdb.org/33583 •

CVE-2005-2084
https://notcve.org/view.php?id=CVE-2005-2084
30 Jun 2005 — Cross-site scripting (XSS) vulnerability in SearchResults.aspx in Community Forum allows remote attackers to inject arbitrary web script or HTML via the q parameter. • http://marc.info/?l=bugtraq&m=111998009409469&w=2 •