4 results (0.002 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in list.php in BLOG:CMS 4.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the FADDR parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en list.php de BLOG:CMS 4.1.3 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro FADDR. • https://www.exploit-db.com/exploits/29095 http://marc.info/?l=bugtraq&m=116387287216907&w=2 http://secunia.com/advisories/23025 http://securitytracker.com/id?1017250 http://www.securityfocus.com/bid/21173 http://www.vupen.com/english/advisories/2006/4598 https://exchange.xforce.ibmcloud.com/vulnerabilities/30385 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL injection vulnerabilities in F-ART BLOG:CMS 4.1 allow remote attackers to execute arbitrary SQL commands via the (1) xagent, (2) xpath, (3) xreferer, and (4) xdns parameters in (a) admin/plugins/NP_Log.php, and the (5) pitem parameter in (b) admin/plugins/NP_Poll.php; and allow remote authenticated users to execute arbitrary SQL commands via the (6) pageRef parameter in (c) admin/plugins/NP_Referrer.php. Múltiples vulnerabilidades de inyección SQL en F-ART BLOG:CMS 4.1, permite a un atacante remoto ejecutar comandos SQL de su eleccióna través de lso parámetros 1) xagent, (2) xpath, (3) xreferer, y (4) xdnsen en (a) admin/plugins/NP_Log.php, y el parámetro pitem en (b)admin/plugins/NP_Poll.php; y permite a un usuario remoto validado ejecutar comandos SQL de su elección a través del parámetro (6)pageRef en (c)admin/plugins/NP_Referrer.php. • http://blogcms.com/wiki/changelog http://secunia.com/advisories/21808 http://securityreason.com/securityalert/1566 http://www.hackers.ir/advisories/blogcms.html http://www.osvdb.org/28604 http://www.osvdb.org/28605 http://www.osvdb.org/28606 http://www.securityfocus.com/archive/1/445538/100/0/threaded http://www.securityfocus.com/bid/19909 http://www.vupen.com/english/advisories/2006/3521 https://exchange.xforce.ibmcloud.com/vulnerabilities/28808 •

CVSS: 7.5EPSS: 9%CPEs: 1EXPL: 1

SQL injection vulnerability in index.php in the NP_SEO plugin in BLOG:CMS before 4.1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. Vulnerabilidad de inyección SQL en el Plugin NS_SEO en BLOG:CMS 4.1.0, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id. • https://www.exploit-db.com/exploits/1960 http://blogcms.com/wiki/changelog http://retrogod.altervista.org/blogcms_400k_sql.html http://secunia.com/advisories/20859 http://securityreason.com/securityalert/1193 http://securitytracker.com/id?1016408 http://www.osvdb.org/26877 http://www.securityfocus.com/archive/1/438603/100/100/threaded http://www.vupen.com/english/advisories/2006/2582 https://exchange.xforce.ibmcloud.com/vulnerabilities/27435 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

PunBB 1.2.9, used alone or with F-ART BLOG:CMS, may trust a client's IP address as specified in the X-Forwarded-For HTTP header rather than the TCP/IP stack, which allows remote attackers to misrepresent their IP address by sending a modified header. • http://secunia.com/advisories/17425 http://secunia.com/advisories/17433 http://www.punbb.org/changelogs/1.2.9_to_1.2.10.txt http://www.securityfocus.com/bid/15326 •