Filtered by vendor Softwarepublico Subscriptions
Total 10 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2017-15373 1 Softwarepublico 1 E-sic 2024-09-17 N/A
E-Sic 1.0 allows SQL injection via the q parameter to esiclivre/restrito/inc/lkpcep.php (aka the search private area).
CVE-2017-15380 1 Softwarepublico 1 E-sic 2024-08-05 N/A
XSS exists in the E-Sic 1.0 /cadastro/index.php URI (aka the requester's registration area) via the nome parameter.
CVE-2017-15379 1 Softwarepublico 1 E-sic 2024-08-05 N/A
An authentication bypass exists in the E-Sic 1.0 /index (aka login) URI via '=''or' values for the username and password.
CVE-2017-15381 1 Softwarepublico 1 E-sic 2024-08-05 N/A
SQL Injection exists in E-Sic 1.0 via the f parameter to esiclivre/restrito/inc/buscacep.php (aka the zip code search script).
CVE-2017-15378 1 Softwarepublico 1 E-sic 2024-08-05 N/A
SQL Injection exists in the E-Sic 1.0 password reset parameter (aka the cpfcnpj parameter to the /reset URI).
CVE-2022-34093 1 Softwarepublico 1 I3geo 2024-08-03 6.1 Medium
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.
CVE-2022-34092 1 Softwarepublico 1 I3geo 2024-08-03 6.1 Medium
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via svg2img.php.
CVE-2022-34094 1 Softwarepublico 1 I3geo 2024-08-03 6.1 Medium
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.
CVE-2022-32409 1 Softwarepublico 1 I3geo 2024-08-03 9.8 Critical
A local file inclusion (LFI) vulnerability in the component codemirror.php of Portal do Software Publico Brasileiro i3geo v7.0.5 allows attackers to execute arbitrary PHP code via a crafted HTTP request.
CVE-2024-24350 1 Softwarepublico 1 E-sic Livre 2024-08-01 8.8 High
File Upload vulnerability in Software Publico e-Sic Livre v.2.0 and before allows a remote attacker to execute arbitrary code via the extension filtering component.