Qsige

Qsige

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 03.10.2023 12:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:23

QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.

  • EPSS 0.14%
  • Veröffentlicht 03.10.2023 12:15:11
  • Zuletzt bearbeitet 21.11.2024 08:34:23

QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to lo...

  • EPSS 0.15%
  • Veröffentlicht 03.10.2023 12:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:23

It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.

  • EPSS 0.03%
  • Veröffentlicht 03.10.2023 12:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:23

The QSige Monitor application does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.

  • EPSS 0.07%
  • Veröffentlicht 03.10.2023 12:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:23

Allows an attacker to perform XSS attacks stored on certain resources. Exploiting this vulnerability can lead to a DoS condition, among other actions.

  • EPSS 0.08%
  • Veröffentlicht 03.10.2023 12:15:10
  • Zuletzt bearbeitet 21.11.2024 08:34:23

The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.

  • EPSS 0.11%
  • Veröffentlicht 03.10.2023 11:15:25
  • Zuletzt bearbeitet 21.11.2024 08:34:23

The file upload functionality is not implemented correctly and allows uploading of any type of file. As a prerequisite, it is necessary for the attacker to log into the application with a valid username.