Filtered by vendor Infovista
Subscriptions
Total
28 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-19769 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "UserProperties.jsp" has reflected XSS via the ConnPoolName parameter. | ||||
CVE-2018-19768 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "SubPagePackages.jsp" has reflected XSS via the ConnPoolName and GroupId parameters. | ||||
CVE-2018-19767 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "PresentSpace.jsp" has reflected XSS via the ConnPoolName and GroupId parameters. | ||||
CVE-2018-19766 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "GroupRessourceAdmin.jsp" has reflected XSS via the ConnPoolName parameter. | ||||
CVE-2018-19765 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "EditCurrentPresentSpace.jsp" has reflected XSS via the ConnPoolName, GroupId, and ParentId parameters. | ||||
CVE-2018-19649 | 1 Infovista | 1 Vistaportal | 2024-11-21 | N/A |
XSS exists in InfoVista VistaPortal SE Version 5.1 (build 51029). VPortal/mgtconsole/RolePermissions.jsp has reflected XSS via the ConnPoolName parameter. | ||||
CVE-2006-0863 | 1 Infovista | 1 Portalse | 2024-11-21 | N/A |
InfoVista PortalSE 2.0 Build 20087 on Solaris 8 allows remote attackers to obtain sensitive information by specifying a nonexistent server in the server field, which reveals the path in an error message. | ||||
CVE-2006-0862 | 1 Infovista | 1 Portalse | 2024-11-21 | N/A |
Unspecified vulnerability in InfoVista PortalSE 2.0 Build 20087 on Solaris 8 without the IV00038969 hotfix allows remote attackers to read arbitrary files via a crafted URL. |