Filtered by vendor Peterselie
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6769 | 1 Peterselie | 1 Yourplace | 2017-09-28 | 6.0 MEDIUM | N/A |
Unrestricted file upload vulnerability in upload.php in YourPlace 1.0.2 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file. | |||||
CVE-2008-6770 | 1 Peterselie | 1 Yourplace | 2017-09-28 | 5.0 MEDIUM | N/A |
YourPlace 1.0.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to a database containing user credentials via a direct request for users.txt. | |||||
CVE-2008-6771 | 1 Peterselie | 1 Yourplace | 2017-09-28 | 5.0 MEDIUM | N/A |
YourPlace 1.0.2 and earlier allows remote attackers to obtain sensitive system information via a direct request via a direct request to user/uploads/phpinfo.php, which calls the phpinfo function. | |||||
CVE-2008-6772 | 1 Peterselie | 1 Yourplace | 2017-09-28 | 7.5 HIGH | N/A |
login/register_form.php in YourPlace 1.0.2 and earlier does not check that a username already exists when a new account is created, which allows remote attackers to bypass intended access restrictions by registering a new account with the username of a target user. | |||||
CVE-2008-6773 | 1 Peterselie | 1 Yourplace | 2017-09-28 | 6.5 MEDIUM | N/A |
Static code injection vulnerability in user/internettoolbar/edit.php in YourPlace 1.0.2 and earlier allows remote authenticated users to execute arbitrary PHP code into user/internettoolbar/index.php via the (1) fav1_url, (2) fav1_name, (3) fav2_url, (4) fav2_name, (5) fav3_url, (6) fav3_name, (7) fav4_url, (8) fav4_name, (9) fav5_url, or (10) fav5_name parameters. | |||||
CVE-2008-6774 | 1 Peterselie | 1 Yourplace | 2017-08-16 | 5.0 MEDIUM | N/A |
internettoolbar/edit.php in YourPlace 1.0.2 and earlier does not end execution when an invalid username is detected, which allows remote attackers to bypass intended restrictions and edit toolbar settings via an invalid username. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. |