Filtered by vendor Ubertec Subscriptions
Filtered by product Help Center Live Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2006-2039 1 Ubertec 1 Help Center Live 2024-11-21 N/A
Multiple SQL injection vulnerabilities in the osTicket module in Help Center Live before 2.1.0 allow remote attackers to execute arbitrary SQL commands via unknown vectors.
CVE-2005-3639 1 Ubertec 1 Help Center Live 2024-11-21 N/A
PHP file inclusion vulnerability in the osTicket module in Help Center Live before 2.0.3 allows remote attackers to access or include arbitrary files via the file parameter, possibly due to a directory traversal vulnerability.
CVE-2005-1673 1 Ubertec 1 Help Center Live 2024-11-20 N/A
Multiple SQL injection vulnerabilities in Help Center Live allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to index.php, (2) tid parameter to view.php, fid parameter to (3) download.php or (4) chat_download.php, (5) status parameter to icon.php, TICKET_tid parameter to (6) index.php or (7) view.php.
CVE-2005-1672 1 Ubertec 1 Help Center Live 2024-11-20 N/A
Multiple cross-site scripting (XSS) vulnerabilities in Help Center Live allow remote attackers to inject arbitrary web script or HTML via the (1) find parameter to index.php, (2) name or (3) message field of a chat request, or (4) the message body when opening a trouble ticket.
CVE-2004-2603 1 Ubertec 1 Help Center Live 2024-11-20 N/A
Cross-site scripting (XSS) vulnerability in the Search module in UberTec Help Center Live (HCL) allows remote attackers to inject arbitrary web script or HTML via the find parameter to index.php.
CVE-2004-2602 1 Ubertec 1 Help Center Live 2024-11-20 N/A
PHP remote file inclusion vulnerability in UberTec Help Center Live (HCL) before 1.2.7 allows remote attackers to execute arbitrary PHP code via a URL in the HCL_path parameter to pipe.php.
CVE-2004-2601 1 Ubertec 1 Help Center Live 2024-11-20 N/A
PHP remote file inclusion vulnerability in UberTec Help Center Live (HCL) allows remote attackers to read local files and possibly execute PHP code via a URL in the SKIN_inner parameter to inc/skin.php.