Show filters
36 Total Results
Displaying 31-36 of 36
Sort by:
Attacker Value
Unknown

CVE-2006-4580

Disclosure Date: December 31, 2006 (last updated October 04, 2023)
register.php in The Address Book 1.04e allows remote attackers to bypass the "Allow User Self-Registration" setting and create arbitrary users by setting the mode parameter to "confirm".
0
Attacker Value
Unknown

CVE-2006-4578

Disclosure Date: December 31, 2006 (last updated October 04, 2023)
export.php in The Address Book 1.04e writes username and password hash information into a publicly accessible file when dumping the MySQL database contents, which allows remote attackers to obtain sensitive information.
0
Attacker Value
Unknown

CVE-2006-5715

Disclosure Date: November 04, 2006 (last updated October 04, 2023)
Easy File Sharing (EFS) Easy Address Book 1.2, when run on an NTFS file system, allows remote attackers to read arbitrary files under the web root by appending "::$DATA" to the end of an HTTP GET request, which accesses the alternate data stream.
0
Attacker Value
Unknown

CVE-2006-4654

Disclosure Date: September 09, 2006 (last updated October 04, 2023)
Format string vulnerability in Easy Address Book Web Server 1.2 allows remote attackers to cause a denial of service (crash) or "compromise the server" via encoded format string specifiers in the query string.
0
Attacker Value
Unknown

CVE-2006-4056

Disclosure Date: August 10, 2006 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in the authentication process in katzlbt (a) The Address Book 1.04e and earlier and (b) The Address Book Reloaded before 2.0-rc4 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password parameters. NOTE: portions of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2005-3037

Disclosure Date: September 22, 2005 (last updated February 22, 2025)
Cross-site scripting (XSS) vulnerability in Handy Address Book Server 1.1 allows remote attackers to inject arbitrary web script or HTML via the SEARCHTEXT parameter in a demos URL.
0