Filtered by vendor Whmcs
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-1702 | 1 Whmcs | 1 Whmcs | 2017-08-16 | 7.5 HIGH | N/A |
SQL injection vulnerability in submitticket.php in WHMCompleteSolution (WHMCS) 4.2 allows remote attackers to execute arbitrary SQL commands via the deptid parameter. | |||||
CVE-2011-4813 | 1 Whmcs | 1 Whmcompletesolution | 2013-07-30 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in clientarea.php in WHMCompleteSolution (WHMCS) 3.x.x allows remote attackers to read arbitrary files via an invalid action and a ../ (dot dot slash) in the templatefile parameter. | |||||
CVE-2013-3536 | 1 Whmcs | 2 Group Pay, Whmcs | 2013-05-14 | 7.5 HIGH | N/A |
SQL injection vulnerability in the gp_LoadUserFromHash function in functions_hash.php in the Group Pay module 1.5 and earlier for WHMCS allows remote attackers to execute arbitrary SQL commands via the hash parameter. | |||||
CVE-2012-0693 | 1 Whmcs | 1 Whmcompletesolution | 2012-04-22 | 5.0 MEDIUM | N/A |
** DISPUTED ** submitticket.php in WHMCompleteSolution (WHMCS) 5.03 allows remote attackers to inject arbitrary code into a subject field via crafted ticket data, a different vulnerability than CVE-2011-5061. NOTE: the vendor disputes this issue, noting that some of the details overlap CVE-2011-5061, but that it "says it affects V5.0.3, and the submitticket.php file, both of which are wrong." | |||||
CVE-2011-4810 | 1 Whmcs | 1 Whmcompletesolution | 2012-02-09 | 5.0 MEDIUM | N/A |
Multiple directory traversal vulnerabilities in WHMCompleteSolution (WHMCS) 3.x and 4.x allow remote attackers to read arbitrary files via the templatefile parameter to (1) submitticket.php and (2) downloads.php, and (3) the report parameter to admin/reports.php. | |||||
CVE-2011-5061 | 1 Whmcs | 1 Whmcompletesolution | 2012-02-07 | 7.5 HIGH | N/A |
functions.php in WHMCompleteSolution (WHMCS) 4.0.x through 5.0.x allows remote attackers to trigger arbitrary code execution in the Smarty templating system by submitting a crafted ticket, related to improper handling of characters in the subject field. |