Filtered by vendor Positive Software
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-4448 | 1 Positive Software | 1 H-sphere | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in actions.php in Positive Software H-Sphere WebShell 4.3.10 allows remote attackers to perform unauthorized actions as an administrator, including file deletion and creation, via a link or IMG tag to the (1) overkill, (2) futils, or (3) edit actions. | ||||
CVE-2008-4447 | 1 Positive Software | 1 H-sphere | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in actions.php in Positive Software H-Sphere WebShell 4.3.10 allows remote attackers to inject arbitrary web script or HTML via (1) the fn parameter during a dload action, (2) the mask parameter during a search action, and (3) the tab parameter during a sysinfo action. | ||||
CVE-2008-1049 | 1 Positive Software | 2 H-sphere, Sitestudio | 2024-11-21 | N/A |
Unspecified vulnerability in Parallels SiteStudio before 1.7.2, and 1.8.x before 1.8b, as used in Parallels H-Sphere 3.0 before Patch 9 and 2.5 before Patch 11, has unknown impact and attack vectors. | ||||
CVE-2007-2633 | 1 Positive Software | 1 Sitestudio | 2024-11-21 | N/A |
Directory traversal vulnerability in H-Sphere SiteStudio 1.6 allows remote attackers to read, or include and execute, arbitrary local files via a .. (dot dot) in the template parameter. | ||||
CVE-2006-6382 | 1 Positive Software | 1 H-sphere | 2024-11-21 | N/A |
The control panel for Positive Software H-Sphere before 2.5.0 RC3 creates log files in a user's directory with insecure permissions, which allows local users to append log data to arbitrary files via a symlink attack. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | ||||
CVE-2006-3278 | 1 Positive Software | 1 H-sphere | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in H-Sphere 2.5.1 Beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) next_template, (2) start, (3) curr_menu_id, and (4) arid parameters in psoft/servlet/resadmin/psoft.hsphere.CP when using the mailman/massmail.html template_name. | ||||
CVE-2006-0193 | 1 Positive Software | 1 H-sphere | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in the Hosting Control Panel (psoft.hsphere.CP) in Positive Software H-Sphere 2.4.3 Patch 8 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter in a login action. | ||||
CVE-2005-4261 | 1 Positive Software | 1 Cp\+ | 2024-11-21 | N/A |
Unspecified vulnerability in Positive Software Corporation CP+ (cpplus) before 2.5.5 allows attackers to have unknown impact and attack vectors, related to "a possible security flaw caused by a bug in Perl." NOTE: unless CP+ includes its own copy of Perl with CVE-2005-3962, this is a different vulnerability than CVE-2005-3962; however, there is insufficient information to be sure. | ||||
CVE-2005-1606 | 1 Positive Software | 1 H-sphere Winbox | 2024-11-20 | N/A |
H-Sphere Winbox 2.4.2 and 2.4.3 RC1 stores sensitive information such as username and password in plaintext in world-readable log files, which allows local users to gain privileges. | ||||
CVE-2005-1605 | 1 Positive Software | 1 Sitestudio | 2024-11-20 | N/A |
Cross-site scripting (XSS) vulnerability in the guestbook for SiteStudio 1.6 allows remote attackers to inject arbitrary web script or HTML via the name field to (1) psoft.guestbook.GuestBookServ in Standalone Site Studio or (2) E-Guest_sign.pl in Integrated Site Studio with H-Sphere. | ||||
CVE-2003-1248 | 1 Positive Software | 1 H-sphere | 2024-11-20 | N/A |
H-Sphere WebShell 2.3 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) mode and (2) zipfile parameters in a URL request. | ||||
CVE-2003-1247 | 1 Positive Software | 1 H-sphere | 2024-11-20 | N/A |
Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist. |
Page 1 of 1.