Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avatic aardvark topsites php 5.0.3 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2009-2302
Cross-site scripting (XSS) vulnerability in index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the q parameter in a search action. NOTE: it was later reported that 5.2.1 is also affected.
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.1.1
Avatic Aardvark Topsites Php
1 EDB exploit
5
CVSSv2
CVE-2009-2304
index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to obtain sensitive information via a nonexistent account name in the u parameter in a rate action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.1.1
Avatic Aardvark Topsites Php 4.0.2
5
CVSSv2
CVE-2009-2303
index.php in Aardvark Topsites PHP 5.2.1 and previous versions allows remote malicious users to obtain sensitive information via a negative integer value for the start parameter in a search action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.1.1
Avatic Aardvark Topsites Php 5.2.0
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started