Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avatic aardvark topsites php 4.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-2302
Cross-site scripting (XSS) vulnerability in index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the q parameter in a search action. NOTE: it was later reported that 5.2.1 is also affected.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
1 EDB exploit
NA
CVE-2009-2304
index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to obtain sensitive information via a nonexistent account name in the u parameter in a rate action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
NA
CVE-2009-2303
index.php in Aardvark Topsites PHP 5.2.1 and previous versions allows remote malicious users to obtain sensitive information via a negative integer value for the start parameter in a search action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
Avatic Aardvark Topsites Php 5.2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started