CVE-2011-3835
- EPSS 1.13%
- Veröffentlicht 24.12.2011 19:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple cross-site scripting (XSS) vulnerabilities in Wuzly 2.0 allow remote attackers to inject arbitrary web script or HTML via the Referer header to (1) admin/login.php and (2) admin/404.php; the (3) q parameter to search.php; the (4) theme_name ...
CVE-2011-3836
- EPSS 0.24%
- Veröffentlicht 24.12.2011 19:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple cross-site request forgery (CSRF) vulnerabilities in Wuzly 2.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator, (2) perform cross-site scripting (XSS), (3) perform SQL injectio...
CVE-2011-3837
- EPSS 0.16%
- Veröffentlicht 24.12.2011 19:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Directory traversal vulnerability in blog_system/data_functions.php in Wuzly 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the preview parameter to index.php.
CVE-2011-3838
- EPSS 0.84%
- Veröffentlicht 24.12.2011 19:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple SQL injection vulnerabilities in Wuzly 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) u parameter to fp.php, (2) epage parameter to newpage.php, (3) epost parameter to newpost.php, and (4) username parameter to logi...
CVE-2011-3839
- EPSS 0.38%
- Veröffentlicht 24.12.2011 19:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
The administration functionality in Wuzly 2.0 allows remote attackers to bypass authentication by setting the dXNlcm5hbWU cookie.