Page 9 of 43 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 2

SQL injection vulnerability in exit.php for Serendipity 0.8 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) url_id or (2) entry_id parameters. • https://www.exploit-db.com/exploits/939 http://seclists.org/lists/bugtraq/2005/Apr/0195.html http://secunia.com/advisories/15145 http://securitytracker.com/id?1013699 http://www.osvdb.org/15542 http://www.s9y.org/5.html http://www.s9y.org/63.html#A9 http://www.securityfocus.com/bid/13161 https://exchange.xforce.ibmcloud.com/vulnerabilities/20119 •

CVSS: 4.3EPSS: 0%CPEs: 16EXPL: 0

Cross-site scripting (XSS) vulnerability in compat.php in Serendipity before 0.7.1 allows remote attackers to inject arbitrary web script or HTML via the searchTerm variable. • http://secunia.com/advisories/13357 http://securitytracker.com/id?1012383 http://sourceforge.net/tracker/index.php?func=detail&aid=1076762&group_id=75065&atid=542822 http://www.osvdb.org/12177 http://www.securityfocus.com/bid/11790 https://exchange.xforce.ibmcloud.com/vulnerabilities/18322 •

CVSS: 5.0EPSS: 2%CPEs: 14EXPL: 4

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php. • https://www.exploit-db.com/exploits/24697 http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup http://marc.info/?l=bugtraq&m=109841283115808&w=2 http://secunia.com/advisories/12909 http://securitytracker.com/id? •