- EPSS 0.55%
- Veröffentlicht 22.02.2006 02:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Leif M. Wright's Blog 3.5 stores the config file and other txt files under the web root with insufficient access control, which allows remote attackers to read the administrator's password.
CVE-2006-0844
- EPSS 0.47%
- Veröffentlicht 22.02.2006 02:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Leif M. Wright's Blog 3.5 does not make a password comparison when authenticating an administrator via a cookie, which allows remote attackers to bypass login authentication, probably by setting the blogAdmin cookie.
CVE-2006-0845
- EPSS 1.2%
- Veröffentlicht 22.02.2006 02:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Leif M. Wright's Blog 3.5 allows remote authenticated users with administrative privileges to execute arbitrary programs, including shell commands, by configuring the sendmail path to a malicious pathname.
CVE-2006-0846
- EPSS 0.46%
- Veröffentlicht 22.02.2006 02:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple cross-site scripting (XSS) vulnerabilities in Leif M. Wright's Blog 3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Referer and (2) User-Agent HTTP headers, which are stored in a log file and not sanitized when ...
CVE-2004-2347
- EPSS 8.98%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
blog.cgi in Leif M. Wright Web Blog 1.1 and 1.1.5 allows remote attackers to execute arbitrary commands via shell metacharacters such as '|' in the file parameter of ViewFile requests.
- EPSS 10.46%
- Veröffentlicht 20.01.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in Web Blog 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file variable.