Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arsc really simple chat vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-0463
home.php in ARSC (Really Simple Chat) 1.0.1 and previous versions allows remote malicious users to determine the full pathname of the web server via an invalid language in the arsc_language parameter, which leaks the pathname in an error message.
Arsc Really Simple Chat Arsc Really Simple Chat 1.0.1
Arsc Really Simple Chat Arsc Really Simple Chat 1.0
4.3
CVSSv2
CVE-2011-2180
Cross-site scripting (XSS) vulnerability in dereferer.php in A Really Simple Chat (ARSC) 3.3-rc2 allows remote malicious users to inject arbitrary web script or HTML via the arsc_link parameter.
Reallysimplechat Really Simple Chat 3.3
4.3
CVSSv2
CVE-2011-2470
Cross-site scripting (XSS) vulnerability in chat/base/admin/login.php in A Really Simple Chat (ARSC) 3.3-rc2 allows remote malicious users to inject arbitrary web script or HTML via the arsc_message parameter.
Reallysimplechat Really Simple Chat 3.3
7.5
CVSSv2
CVE-2011-2181
Multiple SQL injection vulnerabilities in A Really Simple Chat (ARSC) 3.3-rc2 allow remote malicious users to execute arbitrary SQL commands via the (1) arsc_user parameter to base/admin/edit_user.php, (2) arsc_layout_id parameter in base/admin/edit_layout.php, or (3) arsc_room p...
Reallysimplechat Really Simple Chat 3.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started