Filtered by vendor Talentsoft Subscriptions
Total 8 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-12504 1 Talentsoft 1 Unis 2025-12-10 9.8 Critical
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TalentSoft Software UNIS allows SQL Injection.This issue affects UNIS: before 42321.
CVE-2025-6923 1 Talentsoft 1 Unis 2025-12-10 5.4 Medium
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TalentSoft Software UNIS allows Reflected XSS.This issue affects UNIS: before 42957.
CVE-2002-0753 1 Talentsoft 1 Web\+ Server 2025-04-03 N/A
Buffer overflow in Talentsoft Web+ 5.0 allows remote attackers to execute arbitrary code via an HTTP request with a long cookie.
CVE-2006-1897 1 Talentsoft 1 Web\+ Shop 2025-04-03 N/A
Webplus (aka talentsoft) Web+Shop 5.3.6, when Redirect URL for "Script Not Found" Error is not configured, allows remote attackers to obtain sensitive information via a quote (') or possibly other invalid value in the storeid parameter in store.wml in webplus.exe, which reveals the path in a "Script Not Found" error message.
CVE-2006-1682 1 Talentsoft 1 Web\+ Shop 2025-04-03 N/A
Cross-site scripting (XSS) vulnerability in webplus.exe in TalentSoft Web+Shop 5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the deptname parameter, possibly involving the webpshop/ department.wml script.
CVE-2002-0449 1 Talentsoft 1 Web\+ Server 2025-04-03 N/A
Buffer overflow in webpsvc.exe for Talentsoft Web+ 5.0 and earlier allows remote attackers to execute arbitrary code via a long argument to webplus.exe program, which triggers the overflow in webpsvc.exe.
CVE-2000-0282 1 Talentsoft 1 Web\+ 2025-04-03 N/A
TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.
CVE-2002-0450 1 Talentsoft 1 Web\+ Server 2025-04-03 N/A
Buffer overflow in Talentsoft Web+ 5.0 and earlier allows remote attackers to execute arbitrary code via a long Web Markup Language (wml) file name to (1) webplus.dll or (2) webplus.exe.