Filtered by vendor Openwebanalytics Subscriptions
Filtered by product Open Web Analytics Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2010-2677 1 Openwebanalytics 1 Open Web Analytics 2024-08-07 N/A
PHP remote file inclusion vulnerability in mw_plugin.php in Open Web Analytics (OWA) 1.2.3, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the IP parameter. NOTE: some of these details are obtained from third party information.
CVE-2010-2676 1 Openwebanalytics 1 Open Web Analytics 2024-08-07 N/A
Multiple directory traversal vulnerabilities in index.php in Open Web Analytics (OWA) 1.2.3 might allow remote attackers to read arbitrary files via directory traversal sequences in the (1) owa_action and (2) owa_do parameters.
CVE-2014-2294 1 Openwebanalytics 1 Open Web Analytics 2024-08-06 N/A
Open Web Analytics (OWA) before 1.5.7 allows remote attackers to conduct PHP object injection attacks via a crafted serialized object in the owa_event parameter to queue.php.
CVE-2014-1457 1 Openwebanalytics 1 Open Web Analytics 2024-08-06 N/A
Open Web Analytics (OWA) before 1.5.6 improperly generates random nonce values, which makes it easier for remote attackers to bypass a CSRF protection mechanism by leveraging knowledge of an OWA user name.
CVE-2014-1456 1 Openwebanalytics 1 Open Web Analytics 2024-08-06 N/A
Cross-site scripting (XSS) vulnerability in the login page in Open Web Analytics (OWA) before 1.5.6 allows remote attackers to inject arbitrary web script or HTML via the owa_user_id parameter to index.php.
CVE-2014-1206 1 Openwebanalytics 1 Open Web Analytics 2024-08-06 N/A
SQL injection vulnerability in the password reset page in Open Web Analytics (OWA) before 1.5.5 allows remote attackers to execute arbitrary SQL commands via the owa_email_address parameter in a base.passwordResetRequest action to index.php.
CVE-2022-24637 1 Openwebanalytics 1 Open Web Analytics 2024-08-03 9.8 Critical
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.