5 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

18 Nov 2008 — Ocean12 Calendar Manager Gold 2.04 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to o12cal.mdb. Ocean12 Calendar Manager Gold v2.04 almacena información sensible bajo la web raíz con control de acceso insuficiente, lo cual permite a atacantes remotos obtener información sensible a través de una petición directa a o12cal.mdb. • http://packetstorm.linuxsecurity.com/0810-exploits/ocean12-database.txt • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 4

09 May 2006 — Multiple SQL injection vulnerabilities in Ocean12 Calendar Manager Pro 1.00 allow remote attackers to execute arbitrary SQL commands via the (1) date parameter to admin/main.asp, (2) SearchFor parameter to admin/view.asp, or (3) ID parameter to admin/edit.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/27827 •

CVSS: 6.1EPSS: 3%CPEs: 1EXPL: 2

09 May 2006 — Cross-site scripting vulnerability in admin/main.asp in Ocean12 Calendar Manager Pro 1.00 allows remote attackers to inject arbitrary web script or HTML via the date parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/27828 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

31 Dec 2005 — Ocean12 Calendar Manager Pro 1.01 allows remote attackers to bypass authentication and obtain sensitive information via a direct request to /admin/view.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. • https://www.exploit-db.com/exploits/26473 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

22 Apr 2005 — Multiple SQL injection vulnerabilities in Ocean12 Calendar manager 1.01 allow remote attackers to execute arbitrary SQL commands via the Admin_id field. • https://www.exploit-db.com/exploits/25469 •