Call Center Software
Products
1- 4 CVEs
Recent CVEs
4| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2006-7145 | 0.00 | — | 0.01 | Mar 7, 2007 | edit_user.php in Call Center Software 0.93 and earlier allows remote attackers to obtain sensitive information such as account passwords via a modified user_id parameter. | ||
| CVE-2006-7144 | 0.00 | — | 0.02 | Mar 7, 2007 | SQL injection vulnerability in Call Center Software 0.93 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via the user name in the login page. | ||
| CVE-2006-7143 | 0.00 | — | 0.01 | Mar 7, 2007 | Cross-site scripting (XSS) vulnerability in Call Center Software 0.93 and earlier allows remote attackers to inject arbitrary web script or HTML via the problem description field. | ||
| CVE-2007-1161 | 0.00 | — | 0.00 | Mar 2, 2007 | Cross-site scripting (XSS) vulnerability in call_entry.php in Call Center Software 0,93 allows remote attackers to inject arbitrary web script or HTML via the problem_desc parameter, as demonstrated by the ONLOAD attribute of a BODY element. |
- CVE-2006-7145Mar 7, 2007risk 0.00cvss —epss 0.01
edit_user.php in Call Center Software 0.93 and earlier allows remote attackers to obtain sensitive information such as account passwords via a modified user_id parameter.
- CVE-2006-7144Mar 7, 2007risk 0.00cvss —epss 0.02
SQL injection vulnerability in Call Center Software 0.93 and earlier allows remote attackers to execute arbitrary SQL commands and bypass authentication via the user name in the login page.
- CVE-2006-7143Mar 7, 2007risk 0.00cvss —epss 0.01
Cross-site scripting (XSS) vulnerability in Call Center Software 0.93 and earlier allows remote attackers to inject arbitrary web script or HTML via the problem description field.
- CVE-2007-1161Mar 2, 2007risk 0.00cvss —epss 0.00
Cross-site scripting (XSS) vulnerability in call_entry.php in Call Center Software 0,93 allows remote attackers to inject arbitrary web script or HTML via the problem_desc parameter, as demonstrated by the ONLOAD attribute of a BODY element.