Vulnerabilities > Achievo > Achievo > 1.3.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-10-16 | CVE-2009-3705 | Code Injection vulnerability in Achievo PHP remote file inclusion vulnerability in debugger.php in Achievo before 1.4.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter. | 7.5 |
2009-10-16 | CVE-2009-2734 | SQL Injection vulnerability in Achievo SQL injection vulnerability in the get_employee function in classweekreport.inc in Achievo before 1.4.0 allows remote attackers to execute arbitrary SQL commands via the userid parameter (aka user_id variable) to dispatch.php. | 7.5 |
2009-10-16 | CVE-2009-2733 | Cross-Site Scripting vulnerability in Achievo Multiple cross-site scripting (XSS) vulnerabilities in Achievo before 1.4.0 allow remote attackers to inject arbitrary web script or HTML via (1) the scheduler title in the scheduler module, and the (2) atksearch[contractnumber], (3) atksearch_AE_customer[customer], (4) atksearchmode[contracttype], and possibly (5) atksearch[contractname] parameters to the Organization Contracts administration page, reachable through dispatch.php. | 4.3 |
2009-02-03 | CVE-2008-6035 | Cross-Site Scripting vulnerability in Achievo 1.3.2 Cross-site scripting (XSS) vulnerability in dispatch.php in Achievo 1.3.2-STABLE allows remote attackers to inject arbitrary web script or HTML via the atknodetype parameter. | 4.3 |
2009-02-03 | CVE-2008-6034 | Cross-Site Scripting vulnerability in Achievo 1.3.2 Cross-site scripting (XSS) vulnerability in dispatch.php in Achievo 1.3.2 allows remote attackers to inject arbitrary web script or HTML via the atkaction parameter. | 4.3 |
2008-06-17 | CVE-2008-2742 | Improper Input Validation vulnerability in Achievo Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. | 7.5 |