Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2007-3557
Disclosure Date: July 04, 2007 (last updated October 04, 2023)
SQL injection vulnerability in admin/login.php in Wheatblog (wB) 1.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the login parameter.
0
Attacker Value
Unknown
CVE-2006-7002
Disclosure Date: February 12, 2007 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in add_comment.php in Wheatblog (wB) 1.1 allows remote attackers to inject arbitrary web script or HTML via the Email field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue may overlap CVE-2006-5195.
0
Attacker Value
Unknown
CVE-2006-5921
Disclosure Date: November 15, 2006 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in add_comment.php in Wheatblog (wB) allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) WWW, and (3) Comment fields. NOTE: this issue may overlap CVE-2006-5195.
0
Attacker Value
Unknown
CVE-2006-5922
Disclosure Date: November 15, 2006 (last updated October 04, 2023)
index.php in Wheatblog (wB) allows remote attackers to obtain sensitive information via certain values of the postPtr[] and next parameters, which reveals the path in an error message.
0
Attacker Value
Unknown
CVE-2006-5195
Disclosure Date: October 10, 2006 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in Wheatblog 1.0 and 1.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2006-4198
Disclosure Date: August 17, 2006 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter.
0