Multiple cross-site scripting (XSS) vulnerabilities in the AkoBook 3.42 and earlier component (com_akobook) for Mambo allow remote attackers to inject arbitrary web script or HTML via Javascript events in the (1) gbmail and (2) gbpage parameters in the sign function.
Max CVSS
4.3
EPSS Score
0.27%
Published
2007-09-06
Updated
2017-07-29
globals.php in Mambo Site Server 4.0.14 and earlier, when register_globals is disabled, allows remote attackers to overwrite variables in the GLOBALS array and conduct various attacks, as demonstrated using the mosConfig_absolute_path parameter to content.html.php for remote PHP file inclusion.
Max CVSS
2.6
EPSS Score
1.97%
Published
2005-11-22
Updated
2018-10-19
Cross-site scripting (XSS) vulnerability in index.php for Mambo Site Server 4.0.10 allows remote attackers to execute script on other clients via the ?option parameter.
Max CVSS
4.3
EPSS Score
0.27%
Published
2003-03-18
Updated
2017-07-11
Mambo Site Server 4.0.11 installs with a default username and password of admin, which allows remote attackers to gain privileges.
Max CVSS
10.0
EPSS Score
0.58%
Published
2002-12-31
Updated
2017-07-29
The administrator/phpinfo.php script in Mambo Site Server 4.0.11 allows remote attackers to obtain sensitive information such as the full web root path via phpinfo.php, which calls the phpinfo function.
Max CVSS
5.0
EPSS Score
0.72%
Published
2002-12-31
Updated
2017-07-29
Multiple cross-site scripting (XSS) vulnerabilities in Mambo Site Server 4.0.11 allow remote attackers to execute arbitrary script on other clients via (1) search.php and (2) the "Your name" field during account registration.
Max CVSS
6.8
EPSS Score
0.53%
Published
2002-12-31
Updated
2017-07-11
index2.php in Mambo Site Server 3.0.0 through 3.0.5 allows remote attackers to gain Mambo administrator privileges by setting the PHPSESSID parameter and providing the appropriate administrator information in other parameters.
Max CVSS
10.0
EPSS Score
1.23%
Published
2001-07-25
Updated
2017-10-10
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!