Advanced Guestbook 2.4.2 allows remote attackers to obtain sensitive information via an invalid (1) GB_TBL parameter to (a) lang/or (b) image.php, which reveal the database name; (2) an invalid GB_DB parameter to index.php, coupled with a ../index lang cookie, which reveals the installation path; or (3) a direct request to with no parameters or cookies, which reveals the installation path.** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Advanced Guestbook 2.4.2 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) index.php, (2) addentry.php, or (3) picture.php, a different set of vectors than CVE-2006-5804.

updating advanced guestbook 2 3-46

NOTE: The index.php/entry vector might be resultant from CVE-2005-1548.

Cross-site scripting (XSS) vulnerability in in Advanced Guestbook 2.3.1, 2.2, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the entry parameter.

After upgrading a component, default settings will be set to default. Parameters component in menu link will be not changed.

Simply put your email address in the form on the right.

Let Hot Scripts uncover the best free, open source and commercial hot-scripts Guestbooks scripts for your web site.

Directory traversal vulnerability in Advanced Guestbook 2.4.2 allows remote attackers to bypass .htaccess settings, and execute arbitrary PHP local files or read arbitrary local templates, via a ..

(dot dot) in a lang cookie, followed by a filename without its extension, as demonstrated via a request to

Event Listener ){$('#i_header_tab_installs div').html('').css('background','url("/images/remote/nocss_i_header_tab_installs.png") no-repeat scroll center 0 transparent').css('height','11px');$('#i_header_tab_backups div').html('').css('background','url("/images/remote/nocss_i_header_tab_backups.png") no-repeat scroll center 0 transparent').css('height','11px');$('#i_header_tab_browser div').html('').css('background','url("/images/remote/nocss_i_header_tab_browser.png") no-repeat scroll center 0 transparent').css('height','9px');$('#i_header_tab_admin div').html('').css('background','url("/images/remote/nocss_i_header_tab_admin.png") no-repeat scroll center 0 transparent').css('height','10px');};var l=['i_header_tab_installs','i_header_tab_backups','i_header_tab_browser','i_header_tab_admin'];for (var i in l){if(Element By Id(l[i]))Element By Id(l[i]).href=i_urlctrl+'/'+Element By Id(l[i])Attribute('data-cmd');};if (!

Listed below are the download links for the latest stable version of Lazarus as well as any updated files and language packs available.