Vulnerabilities > Hinton Design

DATE CVE VULNERABILITY TITLE RISK
2006-02-08 CVE-2006-0604 Input Validation vulnerability in Hinton Design PHPhg Guestbook 1.2
check.php in Hinton Design phphg Guestbook 1.2 does not check the user password when authenticating via cookies, which allows remote attackers to gain unauthorized access.
network
low complexity
hinton-design
7.5
2006-02-08 CVE-2006-0603 Cross-Site Scripting vulnerability in Hinton Design PHPhg Guestbook 1.2
Multiple cross-site scripting vulnerabilities in signed.php in Hinton Design phphg Guestbook 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) location, (2) website, or (3) message parameter.
network
low complexity
hinton-design CWE-79
6.4
2006-02-08 CVE-2006-0602 SQL Injection vulnerability in Hinton Design PHPhg Guestbook 1.2
Multiple SQL injection vulnerabilities in Hinton Design phphg Guestbook 1.2 allow remote attackers to execute arbitrary SQL commands via the (1) username parameter to check.php or the id parameter to (2) admin/edit_smilie.php, (3) admin/add_theme.php, (4) admin/ban_ip.php, (5) admin/add_lang.php, or (6) admin/edit_filter.php.
network
low complexity
hinton-design CWE-89
7.5
2006-02-07 CVE-2006-0572 Input Validation vulnerability in Hinton Design PHPstatus 1.0
phpstatus 1.0 does not require passwords when using cookies to identify a user, which allows remote attackers to bypass authentication.
network
low complexity
hinton-design
7.5
2006-02-07 CVE-2006-0571 Input Validation vulnerability in Hinton Design PHPstatus 1.0
Multiple cross-site scripting (XSS) vulnerabilities in phpstatus 1.0 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in the administrative interface.
network
hinton-design
4.3
2006-02-07 CVE-2006-0570 Input Validation vulnerability in Hinton Design PHPstatus 1.0
Multiple SQL injection vulnerabilities in phpstatus 1.0, when gpc_magic_quotes is disabled, allow remote attackers to execute arbitrary SQL commands and bypass authentication via (1) the username parameter in check.php and (2) unknown attack vectors in the administrative interface.
network
low complexity
hinton-design
7.5