Vulnerabilities (CVE)

Filtered by vendor Anantasoft Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-3702 1 Anantasoft 1 Ananta Gazelle 2024-02-28 5.0 MEDIUM N/A
Ananta Gazelle 1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/template.php and certain other files.
CVE-2009-3182 1 Anantasoft 1 Gazelle Cms 2024-02-28 6.8 MEDIUM N/A
Unrestricted file upload vulnerability in admin/editor/filemanager/browser.html in Anantasoft Gazelle CMS 1.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in user/File/.
CVE-2008-6665 1 Anantasoft 1 Ananta Cms 2024-02-28 6.8 MEDIUM N/A
change.php in Ananta CMS 1.0b5, with magic_quotes_gpc disabled, allows remote attackers to gain administrator privileges via a crafted email parameter, possibly related to code injection.
CVE-2009-3171 1 Anantasoft 1 Gazelle Cms 2024-02-28 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Anantasoft Gazelle CMS 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user parameter to user.php or (2) lookup parameter to search.php.
CVE-2009-3180 1 Anantasoft 1 Gazelle Cms 2024-02-28 7.5 HIGH N/A
Anantasoft Gazelle CMS 1.0 allows remote attackers to conduct a password reset for other users via a modified user parameter to renew.php.
CVE-2009-3181 1 Anantasoft 1 Gazelle Cms 2024-02-28 5.0 MEDIUM N/A
Directory traversal vulnerability in Anantasoft Gazelle CMS 1.0 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the customizetemplate parameter in a direct request to admin/settemplate.php.
CVE-2009-3167 1 Anantasoft 1 Gazelle Cms 2024-02-28 4.3 MEDIUM N/A
Directory traversal vulnerability in index.php in Anantasoft Gazelle CMS 1.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter.