Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-3834 | 1 Ej3 | 1 Topo | 2024-11-21 | 5.0 MEDIUM | N/A |
EJ3 TOPo 2.2.178 includes the password in cleartext in the ID field to index.php, which allows context-dependent attackers to obtain entry passwords via log files, referrers, or other vectors. | |||||
CVE-2006-3833 | 1 Ej3 | 1 Topo | 2024-11-21 | 5.0 MEDIUM | N/A |
index.php in EJ3 TOPo 2.2.178 allows remote attackers to overwrite existing entries and establish new passwords for the overwritten entries via a URL with a modified entry ID. | |||||
CVE-2006-3536 | 1 Ej3 | 1 Topo | 2024-11-21 | 7.5 HIGH | N/A |
Direct static code injection vulnerability in code/class_db_text.php in EJ3 TOPo 2.2.178 and earlier allows remote attackers to execute arbitrary PHP code via parameters such as (1) descripcion and (2) pais, which are stored directly in a PHP script. NOTE: the provenance of this information is unknown; the details are obtained solely from third party reports. | |||||
CVE-2006-0984 | 1 Ej3 | 1 Topo | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in inc_header.php in EJ3 TOPo 2.2.178 allows remote attackers to inject arbitrary web script or HTML via the gTopNombre parameter. | |||||
CVE-2005-1716 | 1 Ej3 | 1 Topo | 2024-11-20 | 5.0 MEDIUM | N/A |
TOPo 2.2 (2.2.178) stores data files in the data directory under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information such as client IP addresses. | |||||
CVE-2005-1715 | 1 Ej3 | 1 Topo | 2024-11-20 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in index.php for TOPo 2.2 (2.2.178) allows remote attackers to inject arbitrary web script or HTML via the (1) m, (2) s, (3) ID, or (4) t parameters, or the (5) field name, (6) Your Web field, or (7) email field in the comments section. | |||||
CVE-2003-1409 | 1 Ej3 | 1 Topo | 2024-11-20 | 5.0 MEDIUM | N/A |
TOPo 1.43 allows remote attackers to obtain sensitive information by sending an HTTP request with an invalid parameter to (1) in.php or (2) out.php, which reveals the path to the TOPo directory in the error message. |