CVE-2009-3118
https://notcve.org/view.php?id=CVE-2009-3118
SQL injection vulnerability in mod/poll/comment.php in the vote module in Danneo CMS 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the comtext parameter, in conjunction with crafted comname and comtitle parameters, in a poll action to index.php, related to incorrect input sanitization in base/danneo.function.php. Vulnerabilidad de inyección SQL en mod/poll/comment.php en el módulo de voto en Danneo CMS v0.5.2 anteriores, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "context", conjuntamente con los parámetros modificados "comname" y "comtitle" en una acción "poll" al index.php. Relacionado con una limpieza incorrecta de los datos de entrada en base/danneo.function.php. • http://packetstormsecurity.org/0908-exploits/danneo052-sql.txt http://secunia.com/advisories/36440 http://www.vupen.com/english/advisories/2009/2459 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2009-2163 – Sitecore CMS 6.0.0 rev. 090120 - 'default.aspx' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-2163
Cross-site scripting (XSS) vulnerability in login/default.aspx in Sitecore CMS before 6.0.2 Update-1 090507 allows remote attackers to inject arbitrary web script or HTML via the sc_error parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Sitecore CMS versiones anteriores a v6.0.2 Update-1 090507 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro "sc_error". • https://www.exploit-db.com/exploits/34930 http://forum.intern0t.net/intern0t-advisories/1082-intern0t-sitecore-net-6-0-0-cross-site-scripting-vulnerability.html http://secunia.com/advisories/35353 http://www.securityfocus.com/archive/1/504093/100/0/threaded http://www.securityfocus.com/archive/1/504132/100/0/threaded • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2009-1055
https://notcve.org/view.php?id=CVE-2009-1055
Unspecified vulnerability in the web service in Sitecore CMS 5.3.1 rev. 071114 allows remote authenticated users to gain access to security databases, and obtain administrative and user credentials, via unknown vectors related to SOAP and XML requests. Vulnerabilidad inespecífica en el servicio web en Sitecore CMS v5.3.1 rev. 071114 permite a usuarios remotos autenticados conseguir acceso a las bases de datos de seguridad, y obtener credenciales administrativas y de usuario, a través de vectores desconocidos relacionados con las peticiones a SOAP y XML. • http://sdn5.sitecore.net/Products/Sitecore%20V5/Sitecore%20CMS%205%2C-d-%2C3/ReleaseNotes/V5%2C-d-%2C3%2C-d-%2C2/ChangeLog.aspx http://secunia.com/advisories/34356 http://www.securityfocus.com/archive/1/501929/100/0/threaded http://www.securityfocus.com/bid/34162 http://www.vupen.com/english/advisories/2009/0753 https://exchange.xforce.ibmcloud.com/vulnerabilities/49298 •
CVE-2009-0584 – argyllcms: Multiple insufficient upper-bounds checks on certain sizes in the International Color Consortium Format Library
https://notcve.org/view.php?id=CVE-2009-0584
icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. icc.c, perteneciente a la librería de formatos del International Color Consortium (ICC) (alias icclib), tal y como se utiliza en Ghostscript 8.64 y anteriores y Argyll Color Management System (CMS) 1.0.3 y anteriores, permite causar una denegación de servicio (con caída de la aplicación) a atacantes dependientes de contexto, o posiblemente ejecutar código arbitrario por medio de un fichero de dispositivo diseñado para procesar archivos de imagen con modificaciones relacionadas con valores enteros grandes para determinados tamaños, en relación con un perfil ICC en un (1) PostScript o (2) un archivo PDF con imágenes incrustadas. • http://bugs.gentoo.org/show_bug.cgi?id=261087 http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html http://osvdb.org/52988 http://secunia.com/advisories/34266 http://secunia.com/advisories/34373 http://secunia.com/advisories/34381 http://secunia.com/advisories/34393 http://secunia.com/advisories/34398 http://secunia.com/advisories/34418 http://secunia.com/advisories/34437 http://secunia.com/advisories/34443 http://secunia.com/advisories/34469 http: • CWE-189: Numeric Errors •
CVE-2008-4603 – iGaming CMS 2.0 Alpha 1 - 'search.php' SQL Injection
https://notcve.org/view.php?id=CVE-2008-4603
SQL injection vulnerability in search.php in iGaming CMS 2.0 Alpha 1 allows remote attackers to execute arbitrary SQL commands via the keywords parameter in a search_games action. Vulnerabilidad de inyección SQL en search.php en iGaming CMS v2.0 Alpha 1 permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro "keywords"en una acción "search_games". • https://www.exploit-db.com/exploits/6769 http://securityreason.com/securityalert/4433 http://www.securityfocus.com/bid/31793 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •