![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1449
https://notcve.org/view.php?id=CVE-2005-1449
03 May 2005 — Unknown vulnerability in serendipity_config_local.inc.php for Serendipity before 0.8 has unknown impact. • http://secunia.com/advisories/15145 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1134 – S9Y Serendipity 0.8beta4 - 'exit.php' SQL Injection
https://notcve.org/view.php?id=CVE-2005-1134
13 Apr 2005 — SQL injection vulnerability in exit.php for Serendipity 0.8 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters. • https://www.exploit-db.com/exploits/939 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2157
https://notcve.org/view.php?id=CVE-2004-2157
31 Dec 2004 — Cross-site scripting (XSS) vulnerability in Comment.php in Serendipity 0.7 beta1, and possibly other versions before 0.7-beta3, allows remote attackers to inject arbitrary HTML and PHP code via the (1) email or (2) username field. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/026955.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2525
https://notcve.org/view.php?id=CVE-2004-2525
31 Dec 2004 — Cross-site scripting (XSS) vulnerability in compat.php in Serendipity before 0.7.1 allows remote attackers to inject arbitrary web script or HTML via the searchTerm variable. • http://secunia.com/advisories/13357 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2158 – S9Y Serendipity 0.7-beta1 - SQL Injection
https://notcve.org/view.php?id=CVE-2004-2158
31 Dec 2004 — SQL injection vulnerability in Serendipity 0.7-beta1 allows remote attackers to execute arbitrary SQL commands via the entry_id parameter to (1) exit.php or (2) comment.php. • https://www.exploit-db.com/exploits/561 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1620 – S9Y Serendipity 0.x - 'exit.php' HTTP Response Splitting
https://notcve.org/view.php?id=CVE-2004-1620
21 Oct 2004 — CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php. • https://www.exploit-db.com/exploits/24697 •