CVE-2002-0486
- EPSS 0.08%
- Veröffentlicht 12.08.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Intellisol Xpede 4.1 uses weak encryption to store authentication information in cookies, which could allow local users with access to the cookies to gain privileges.
CVE-2002-0487
- EPSS 0.15%
- Veröffentlicht 12.08.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Intellisol Xpede 4.1 stores passwords in plaintext in a Javascript "session timeout" re-authentication capability, which could allow local users with access to gain privileges of other Xpede users by reading the password from the source file, e.g. fr...
CVE-2002-0579
- EPSS 1.88%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 allows remote attackers to gain privileges as an Xpede administrator via a direct HTTP request to the /admin/adminproc.asp script, which does not prompt for a password.
CVE-2002-0580
- EPSS 0.85%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 allows remote attackers to obtain the database username via a request to datasource.asp, which leaks the username in a form and allows the attacker to more easily conduct brute force password guessing attacks.
CVE-2002-0581
- EPSS 1.65%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 allows remote attackers to execute arbitrary SQL commands and read, modify, or steal credentials from the database via the Qry parameter in the sprc.asp script.
- EPSS 1.17%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 stores temporary expense claim reports in a world-readable and indexable /reports/temp directory, which allows remote attackers to read the reports by accessing the directory.
- EPSS 1.17%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 uses a small random namespace (5 alphanumeric characters) for temporary expense claim reports in the /reports/temp directory, which allows remote attackers to read the reports via a brute force attack.
- EPSS 2.26%
- Veröffentlicht 18.06.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
WorkforceROI Xpede 4.1 allows remote attackers to read user timesheets by modifying the TSN ID parameter to the ts_app_process.asp script, which is easily guessable because it is incremented by 1 for each new timesheet.