Page 11 of 52 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in Comment.php in Serendipity 0.7 beta1, and possibly other versions before 0.7-beta3, allows remote attackers to inject arbitrary HTML and PHP code via the (1) email or (2) username field. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html http://secunia.com/advisories/12673 http://securitytracker.com/id?1011448 http://www.securityfocus.com/bid/11269 https://exchange.xforce.ibmcloud.com/vulnerabilities/17536 •

CVSS: 5.0EPSS: 2%CPEs: 14EXPL: 4

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php. • https://www.exploit-db.com/exploits/24697 http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup http://marc.info/?l=bugtraq&m=109841283115808&w=2 http://secunia.com/advisories/12909 http://securitytracker.com/id? •