Liveresponse
by Kayako
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2005-2461 | 0.03 | — | 0.01 | Dec 31, 2005 | Multiple SQL injection vulnerabilities in the calendar feature in Kayako liveResponse 2.x allow remote attackers to execute arbitrary SQL commands via the (1) year or (2) date parameter. | ||
| CVE-2005-2460 | 0.03 | — | 0.03 | Dec 31, 2005 | Multiple cross-site scripting (XSS) vulnerabilities in Kayako liveResponse 2.x allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter or (2) name field when entering a session or sending a message. | ||
| CVE-2005-2463 | 0.00 | — | 0.01 | Dec 31, 2005 | Kayako liveResponse 2.x allows remote attackers to obtain sensitive information via a direct request to addressbook.php and other include scripts, which reveals the path in an error message. | ||
| CVE-2005-2462 | 0.00 | — | 0.00 | Dec 31, 2005 | Kayako liveResponse 2.x, when logging in a user, records the password in plaintext in the URL, which allows local users and possibly remote attackers to gain privileges. |
- CVE-2005-2461Dec 31, 2005risk 0.03cvss —epss 0.01
Multiple SQL injection vulnerabilities in the calendar feature in Kayako liveResponse 2.x allow remote attackers to execute arbitrary SQL commands via the (1) year or (2) date parameter.
- CVE-2005-2460Dec 31, 2005risk 0.03cvss —epss 0.03
Multiple cross-site scripting (XSS) vulnerabilities in Kayako liveResponse 2.x allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter or (2) name field when entering a session or sending a message.
- CVE-2005-2463Dec 31, 2005risk 0.00cvss —epss 0.01
Kayako liveResponse 2.x allows remote attackers to obtain sensitive information via a direct request to addressbook.php and other include scripts, which reveals the path in an error message.
- CVE-2005-2462Dec 31, 2005risk 0.00cvss —epss 0.00
Kayako liveResponse 2.x, when logging in a user, records the password in plaintext in the URL, which allows local users and possibly remote attackers to gain privileges.