Page 10 of 47 results (0.017 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 4

SQL injection vulnerability in Serendipity 0.7-beta1 allows remote attackers to execute arbitrary SQL commands via the entry_id parameter to (1) exit.php or (2) comment.php. • https://www.exploit-db.com/exploits/561 http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html http://secunia.com/advisories/12673 http://securitytracker.com/id?1011448 http://www.osvdb.org/10370 http://www.osvdb.org/10371 http://www.securityfocus.com/bid/11269 https://exchange.xforce.ibmcloud.com/vulnerabilities/17533 •

CVSS: 5.0EPSS: 2%CPEs: 14EXPL: 4

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php. • https://www.exploit-db.com/exploits/24697 http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup http://marc.info/?l=bugtraq&m=109841283115808&w=2 http://secunia.com/advisories/12909 http://securitytracker.com/id? •