cpe:2.3:a:webcalendar:webcalendar:1.0.1:*:*:*:*:*:*:*
includes/functions.php in Craig Knudsen WebCalendar before 1.0.5 does not protect the noSet variable from external modification, which allows remote attackers to set arbitrary global variables via a URL with modified values in the noSet parameter, which leads to resultant vulnerabilities that probably include remote file inclusion and other issues.
Max CVSS
7.5
EPSS Score
14.83%
Published
2007-03-08
Updated
2017-07-29
WebCalendar 1.0.1 to 1.0.3 generates different error messages depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames.
Max CVSS
5.0
EPSS Score
1.17%
Published
2006-05-09
Updated
2018-10-18
SQL injection vulnerability in WebCalendar 1.0.1 allows remote attackers to execute arbitrary SQL commands via the time_range parameter to edit_report_handler.php. NOTE: the startid/activity_log.php vector is already covered by CVE-2005-3949.
Max CVSS
7.5
EPSS Score
0.53%
Published
2005-12-04
Updated
2018-10-19
CRLF injection vulnerability in layers_toggle.php in WebCalendar 1.0.1 might allow remote attackers to modify HTTP headers and conduct HTTP response splitting attacks via the ret parameter, which is used to redirect URL requests.
Max CVSS
5.0
EPSS Score
4.84%
Published
2005-12-04
Updated
2018-10-19
export_handler.php in WebCalendar 1.0.1 allows remote attackers to overwrite WebCalendar data files via a modified id parameter.
Max CVSS
5.0
EPSS Score
1.22%
Published
2005-12-01
Updated
2018-10-19
Multiple SQL injection vulnerabilities in WebCalendar 1.0.1 allow remote attackers to execute arbitrary SQL commands via the (1) startid parameter to activity_log.php, (2) startid parameter to admin_handler.php, (3) template parameter to edit_template.php, and (4) multiple parameters to export_handler.php.
Max CVSS
7.5
EPSS Score
0.79%
Published
2005-12-01
Updated
2018-10-19
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!