Vulnerabilities (CVE)

Filtered by vendor Alstrasoft Subscribe
Filtered by product Webhost Directory
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2008-5650 1 Alstrasoft 1 Webhost Directory 2023-12-10 7.5 HIGH N/A
SQL injection vulnerability in the login directory in AlstraSoft Web Host Directory allows remote attackers to execute arbitrary SQL commands via the pwd parameter.
CVE-2006-6817 1 Alstrasoft 1 Webhost Directory 2023-12-10 5.0 MEDIUM N/A
AlstraSoft Web Host Directory allows remote attackers to obtain sensitive information by requesting any invalid URI, which reveals the path in an error message, a different vulnerability than CVE-2006-2617.
CVE-2006-6818 1 Alstrasoft 1 Webhost Directory 2023-12-10 7.5 HIGH N/A
AlstraSoft Web Host Directory allows remote attackers to bypass authentication and change the admin password via a direct request to admin/config.
CVE-2006-6819 1 Alstrasoft 1 Webhost Directory 2023-12-10 6.4 MEDIUM N/A
AlstraSoft Web Host Directory stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a backup database via a direct request for admin/backup/db.
CVE-2006-2618 1 Alstrasoft 1 Webhost Directory 2023-12-10 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in (1) AlstraSoft Web Host Directory 1.2, aka (2) HyperStop WebHost Directory 1.2, might allow remote attackers to inject arbitrary web script or HTML via the "write a review" box. NOTE: since user reviews do not require administrator privileges, and an auto-approve mechanism exists, this issue is a vulnerability.
CVE-2006-2616 1 Alstrasoft 1 Webhost Directory 2023-12-10 7.5 HIGH N/A
SQL injection vulnerability in the search script in (1) AlstraSoft Web Host Directory 1.2, aka (2) HyperStop WebHost Directory 1.2, allows remote attackers to execute arbitrary SQL commands via the uri parameter.
CVE-2006-2617 1 Alstrasoft 1 Webhost Directory 2023-12-10 5.0 MEDIUM N/A
(1) AlstraSoft Web Host Directory 1.2, aka (2) HyperStop WebHost Directory 1.2, allows remote attackers to obtain the installation path via an invalid entry in the Username field on the login page, which causes the path to be displayed in an SQL error. NOTE: this issue might be resultant from SQL injection.