Filtered by vendor Anantasoft
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-3702 | 1 Anantasoft | 1 Ananta Gazelle | 2024-02-04 | 5.0 MEDIUM | N/A |
Ananta Gazelle 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/template.php and certain other files. | |||||
CVE-2009-3171 | 1 Anantasoft | 1 Gazelle Cms | 2024-02-04 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Anantasoft Gazelle CMS 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user parameter to user.php or (2) lookup parameter to search.php. | |||||
CVE-2008-6665 | 1 Anantasoft | 1 Ananta Cms | 2024-02-04 | 6.8 MEDIUM | N/A |
change.php in Ananta CMS 1.0b5, with magic_quotes_gpc disabled, allows remote attackers to gain administrator privileges via a crafted email parameter, possibly related to code injection. | |||||
CVE-2009-3180 | 1 Anantasoft | 1 Gazelle Cms | 2024-02-04 | 7.5 HIGH | N/A |
Anantasoft Gazelle CMS 1.0 allows remote attackers to conduct a password reset for other users via a modified user parameter to renew.php. | |||||
CVE-2009-3167 | 1 Anantasoft | 1 Gazelle Cms | 2024-02-04 | 4.3 MEDIUM | N/A |
Directory traversal vulnerability in index.php in Anantasoft Gazelle CMS 1.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter. | |||||
CVE-2009-3181 | 1 Anantasoft | 1 Gazelle Cms | 2024-02-04 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in Anantasoft Gazelle CMS 1.0 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the customizetemplate parameter in a direct request to admin/settemplate.php. | |||||
CVE-2009-3182 | 1 Anantasoft | 1 Gazelle Cms | 2024-02-04 | 6.8 MEDIUM | N/A |
Unrestricted file upload vulnerability in admin/editor/filemanager/browser.html in Anantasoft Gazelle CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in user/File/. |