Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avatic aardvark topsites php 4.0.2 vulnerabilities and exploits
(subscribe to this query)
435
VMScore
CVE-2009-2302
Cross-site scripting (XSS) vulnerability in index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the q parameter in a search action. NOTE: it was later reported that 5.2.1 is also affected.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
1 EDB exploit
445
VMScore
CVE-2009-2304
index.php in Aardvark Topsites PHP 5.2.0 and previous versions allows remote malicious users to obtain sensitive information via a nonexistent account name in the u parameter in a rate action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
445
VMScore
CVE-2009-2303
index.php in Aardvark Topsites PHP 5.2.1 and previous versions allows remote malicious users to obtain sensitive information via a negative integer value for the start parameter in a search action, which reveals the installation path in an error message.
Avatic Aardvark Topsites Php 5
Avatic Aardvark Topsites Php
Avatic Aardvark Topsites Php 4.2.2
Avatic Aardvark Topsites Php 4.0.2
Avatic Aardvark Topsites Php 5.0.3
Avatic Aardvark Topsites Php 5.1.2
Avatic Aardvark Topsites Php 4.1.1
Avatic Aardvark Topsites Php 5.2.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started