RSS   Podatności dla 'Isupport'   RSS

2012-10-08
 
CVE-2012-5326

CWE-352
 

 
Cross-site request forgery (CSRF) vulnerability in admin/function.php in IDevSpot iSupport 1.x allows remote attackers to hijack the authentication of administrators for requests that add administrator accounts via an administrators action.

 
2009-12-28
 
CVE-2009-4434

CWE-22
 

 
Directory traversal vulnerability in index.php in IDevSpot iSupport 1.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter.

 
 
CVE-2009-4433

CWE-79
 

 
Multiple cross-site scripting (XSS) vulnerabilities in IDevSpot iSupport 1.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (a) 5 or (b) 9 field in a post action to ticket_function.php, reachable through ticket_submit.php and index.php; (c) the which parameter to function.php, or (d) the which parameter to index.php, related to knowledgebase_list.php. NOTE: some of these details are obtained from third party information.

 
2007-12-27
 
CVE-2007-6539

CWE-94
 

 
PHP local file inclusion vulnerability in index.php in IDevspot iSupport 1.8 allows remote attackers to include local files via the include_file parameter.

 
2006-09-19
 
CVE-2006-4884

 

 
Multiple cross-site scripting (XSS) vulnerabilities in IDevSpot iSupport 1.8 allow remote attackers to inject arbitrary web script or HTML via (1) the suser parameter in support/rightbar.php, (2) the ticket_id parameter in support/open_tickets.php, and (3) the cons_page_title parameter in index.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

 
2005-12-31
 
CVE-2005-4616

 

 
SQL injection vulnerability in index.php in iSupport 1.06 allows remote attackers to execute arbitrary SQL commands via the include_file parameter.

 

 >>> Vendor: Idevspot 9 Produkty
Isupport
Autohost
Phphostbot
Phplinkexchange
Textads
Bizdirectory
Nixieaffiliate
Idevcart
Idev-businessdirectory


Copyright 2024, cxsecurity.com

 

Back to Top