Open-realty » Open-realty : Security Vulnerabilities, CVEs,
Directory traversal vulnerability in Open-Realty CMS 2.5.8 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the select_users_template parameter to index.php.
Max CVSS
6.8
EPSS Score
1.69%
Published
2012-09-06
Updated
2017-08-29
Open-Realty 2.5.8 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by install/versions/upgrade_115.inc.php and certain other files.
Max CVSS
5.0
EPSS Score
0.38%
Published
2011-09-24
Updated
2017-08-29
Eval injection vulnerability in adodb-perf-module.inc.php in ADOdb Lite 1.42 and earlier, as used in products including CMS Made Simple, SAPID CMF, Journalness, PacerCMS, and Open-Realty, allows remote attackers to execute arbitrary code via PHP sequences in the last_module parameter.
Max CVSS
6.8
EPSS Score
72.20%
Published
2007-09-24
Updated
2017-09-29
index.php in Open-Realty 2.3.4 allows remote attackers to obtain sensitive information (the full path) via an invalid listingID parameter in a listingview action.
Max CVSS
5.0
EPSS Score
0.41%
Published
2007-01-25
Updated
2018-10-16
SQL injection vulnerability, possibly in search.inc.php, in Open-Realty 2.3.1 allows remote attackers to execute arbitrary SQL commands via the sorttype parameter to index.php.
Max CVSS
7.5
EPSS Score
0.97%
Published
2006-06-22
Updated
2017-07-20
5 vulnerabilities found