Filtered by vendor Cgi-rescue
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-5723 | 1 Cgi-rescue | 2 Kannibbs2000, Kannibbs2000i | 2024-11-21 | N/A |
Directory traversal vulnerability in CGI RESCUE KanniBBS2000 (aka KanniBBS2000i, MiniBBS2000, and MiniBBS2000i) before 1.03 allows remote attackers to read arbitrary files via unspecified vectors. | ||||
CVE-2007-4655 | 1 Cgi-rescue | 1 Shopping Basket Professional | 2024-11-21 | N/A |
Multiple directory traversal vulnerabilities in CGI RESCUE Shopping Basket Professional 7.51 and earlier allow remote attackers to list arbitrary directories, and possibly read arbitrary files, via directory traversal sequences in unspecified parameters to (1) list.cgi or (2) list2.cgi. | ||||
CVE-2007-0565 | 1 Cgi-rescue | 1 Shopping Basket Professional | 2024-11-21 | N/A |
CGI-Rescue Shopping Basket Professional 7.50 and earlier allows remote attackers to inject arbitrary operating system commands via unspecified vectors. | ||||
CVE-2007-0547 | 1 Cgi-rescue | 1 Webform | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in CGI-RESCUE WebFORM 4.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2006-4344 | 1 Cgi-rescue | 1 Mail F W System | 2024-11-21 | N/A |
CRLF injection vulnerability in CGI-Rescue Mail F/W System (formd) before 8.3 allows remote attackers to spoof e-mails and inject e-mail headers via unspecified vectors in (1) mail.cgi and (2) query.cgi. | ||||
CVE-2006-2944 | 1 Cgi-rescue | 1 Form2mail | 2024-11-21 | N/A |
Unspecified vulnerability in CGI-RESCUE FORM2MAIL 1.21 and earlier allows remote attackers to inject email headers, which facilitates sending spam messages. NOTE: the details for this issue are obtained from third party information. | ||||
CVE-2006-2943 | 1 Cgi-rescue | 1 Webform | 2024-11-21 | N/A |
Unspecified vulnerability in CGI-RESCUE WebFORM 4.1 and earlier allows remote attackers to inject email headers, which facilitates sending spam messages. NOTE: the details for this issue are obtained from third party information. |
Page 1 of 1.