We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as problematic was found in Realce Tecnologia Queue Ticket Kiosk up to 20250517. Affected by this vulnerability is an unknown functionality of the file /adm/index.php of the component Cadastro de Administrador Page. The manipulation of the argument Name/Usuário leads to cross site scripting. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
In Realce Tecnologia Queue Ticket Kiosk bis 20250517 wurde eine problematische Schwachstelle entdeckt. Betroffen ist eine unbekannte Verarbeitung der Datei /adm/index.php der Komponente Cadastro de Administrador Page. Dank Manipulation des Arguments Name/Usuário mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.
2025-05-25: | Advisory disclosed |
2025-05-25: | VulDB entry created |
2025-05-25: | VulDB entry last update |
j369 (VulDB User)
vuldb.com/?id.310267 (VDB-310267 | Realce Tecnologia Queue Ticket Kiosk Cadastro de Administrador Page index.php cross site scripting)
vuldb.com/?ctiid.310267 (VDB-310267 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.579852 (Submit #579852 | Realce Tecnologia Queue ticket kiosk web application N/A Stored Cross Site Scripting)
Support options