Filtered by vendor Digiappz
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6487 | 1 Digiappz | 1 Digiaffiliate | 2024-11-21 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in login.asp in Digiappz DigiAffiliate 1.4 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) admin and (2) password fields. | |||||
CVE-2008-3309 | 1 Digiappz | 1 Digileave | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in info_book.asp in DigiLeave 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the book_id parameter. | |||||
CVE-2008-1560 | 1 Digiappz | 1 Digidomain | 2024-11-21 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Digiappz DigiDomain 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) domain parameter to lookup_result.asp, and the (2) word1 and (3) word2 parameters to suggest_result.asp. | |||||
CVE-2007-2880 | 1 Digiappz | 1 Digirez | 2024-11-21 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Digirez 3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) Room_name parameter to room/info_book.asp or the (2) curYear parameter to room/week.asp. | |||||
CVE-2007-0306 | 1 Digiappz | 1 Digiaffiliate | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in visu_user.asp in Digiappz DigiAffiliate 1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | |||||
CVE-2007-0128 | 1 Digiappz | 1 Digirez | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in info_book.asp in Digirez 3.4 and earlier allows remote attackers to execute arbitrary SQL commands via the book_id parameter. | |||||
CVE-2006-4524 | 1 Digiappz | 1 Freekot | 2024-11-21 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in login_verif.asp in Digiappz Freekot 1.01 allow remote attackers to execute arbitrary SQL commands via the (1) login or (2) password parameters. NOTE: some of these details are obtained from third party information. |