CVE-2008-0400
- EPSS 0.29%
- Veröffentlicht 23.01.2008 12:00:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Cross-site scripting (XSS) vulnerability in header.tpl.php in the modern template for Singapore 0.10.1 allows remote attackers to inject arbitrary web script or HTML via the gallery parameter to default.php.
CVE-2006-3194
- EPSS 8.39%
- Veröffentlicht 23.06.2006 00:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in index.php in singapore 0.10.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) sequence and trailing null (%00) byte in the (1) gallery and (2) template parameter.
CVE-2006-3195
- EPSS 2.6%
- Veröffentlicht 23.06.2006 00:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Cross-site scripting (XSS) vulnerability in index.php in singapore 0.10.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the template parameter.
- EPSS 0.39%
- Veröffentlicht 23.06.2006 00:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
index.php in singapore 0.10.0 and earlier allows remote attackers to obtain the installation path via an invalid template parameter, which reveals the path in an error message.
CVE-2006-2262
- EPSS 4.02%
- Veröffentlicht 09.05.2006 10:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Cross-site scripting (XSS) vulnerability in index.php in singapore 0.9.7 allows remote attackers to inject arbitrary web script or HTML via the image parameter.
- EPSS 0.35%
- Veröffentlicht 16.06.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
singapore 0.9.11 allows remote attackers to obtain sensitive information via a direct request to (1) admin.class.php, (2) any .tpl.php file in templates/admin_default/, or (3) any .tpl.php file in templates/default/, which reveal the path in an error...
CVE-2005-1955
- EPSS 0.44%
- Veröffentlicht 12.06.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Cross-site scripting (XSS) vulnerability in index.php in singapore 0.9.11 allows remote attackers to inject arbitrary web script or HTML via the gallery parameter.