Vulnerabilities > Anantasoft
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-09-23 | CVE-2011-3702 | Information Exposure vulnerability in Anantasoft Ananta Gazelle 1.0 Ananta Gazelle 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/template.php and certain other files. | 5.0 |
2009-09-11 | CVE-2009-3182 | Permissions, Privileges, and Access Controls vulnerability in Anantasoft Gazelle CMS 1.0 Unrestricted file upload vulnerability in admin/editor/filemanager/browser.html in Anantasoft Gazelle CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in user/File/. | 6.8 |
2009-09-11 | CVE-2009-3181 | Path Traversal vulnerability in Anantasoft Gazelle CMS 1.0 Directory traversal vulnerability in Anantasoft Gazelle CMS 1.0 allows remote attackers to overwrite arbitrary files via a .. | 5.0 |
2009-09-11 | CVE-2009-3180 | Credentials Management vulnerability in Anantasoft Gazelle CMS 1.0 Anantasoft Gazelle CMS 1.0 allows remote attackers to conduct a password reset for other users via a modified user parameter to renew.php. | 7.5 |
2009-09-11 | CVE-2009-3171 | Cross-Site Scripting vulnerability in Anantasoft Gazelle CMS Multiple cross-site scripting (XSS) vulnerabilities in Anantasoft Gazelle CMS 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user parameter to user.php or (2) lookup parameter to search.php. | 4.3 |
2009-09-11 | CVE-2009-3167 | Path Traversal vulnerability in Anantasoft Gazelle CMS 1.0 Directory traversal vulnerability in index.php in Anantasoft Gazelle CMS 1.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. | 4.3 |
2009-04-08 | CVE-2008-6665 | Code Injection vulnerability in Anantasoft Ananta CMS 1.0B5 change.php in Ananta CMS 1.0b5, with magic_quotes_gpc disabled, allows remote attackers to gain administrator privileges via a crafted email parameter, possibly related to code injection. | 6.8 |