Filtered by vendor Bitweaver
Subscribe
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-29025 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/my_images.php URI. | |||||
CVE-2021-29032 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/preferences.php URI. | |||||
CVE-2021-29031 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/users_import.php URI. | |||||
CVE-2021-29033 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/edit_group.php URI. | |||||
CVE-2021-29029 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/edit_personal_page.php URI. | |||||
CVE-2021-29030 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/index.php URI. | |||||
CVE-2021-29026 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/permissions.php URI. | |||||
CVE-2021-29027 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/index.php URI. | |||||
CVE-2021-29028 | 1 Bitweaver | 1 Bitweaver | 2021-03-24 | 3.5 LOW | 4.8 MEDIUM |
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/user_activity.php URI. | |||||
CVE-2012-5193 | 1 Bitweaver | 1 Bitweaver | 2019-11-15 | 4.3 MEDIUM | 6.1 MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) stats/index.php or (2) newsletters/edition.php or the (3) username parameter to users/remind_password.php, (4) days parameter to stats/index.php, (5) login parameter to users/register.php, or (6) highlight parameter. | |||||
CVE-2006-3105 | 1 Bitweaver | 1 Bitweaver | 2018-10-18 | 5.0 MEDIUM | N/A |
CRLF injection vulnerability in Bitweaver 1.3 allows remote attackers to conduct HTTP response splitting attacks by via CRLF sequences in multiple unspecified parameters that are injected into HTTP headers, as demonstrated by the BWSESSION parameter in index.php. | |||||
CVE-2006-3104 | 1 Bitweaver | 1 Bitweaver | 2018-10-18 | 5.0 MEDIUM | N/A |
users/index.php in Bitweaver 1.3 allows remote attackers to obtain sensitive information via an invalid sort_mode parameter, which reveals the installation path and database information in the resultant error message. | |||||
CVE-2006-3103 | 1 Bitweaver | 1 Bitweaver | 2018-10-18 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Bitweaver 1.3 allows remote attackers to inject arbitrary web script or HTML via the (1) error parameter in users/login.php and the (2) feedback parameter in articles/index.php. | |||||
CVE-2006-3102 | 1 Bitweaver | 1 Bitweaver | 2018-10-18 | 5.1 MEDIUM | N/A |
Race condition in articles/BitArticle.php in Bitweaver 1.3, when run on Apache with the mod_mime extension, allows remote attackers to execute arbitrary PHP code by uploading arbitrary files with double extensions, which are stored for a small period of time under the webroot in the temp/articles directory. | |||||
CVE-2007-0526 | 1 Bitweaver | 1 Bitweaver | 2018-10-16 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 1.3.1 allow remote attackers to inject arbitrary web script or HTML via the URL (PATH_INFO) to (1) articles/edit.php, (2) articles/list.php, (3) blogs/list_blogs.php, or (4) blogs/rankings.php. | |||||
CVE-2007-6651 | 1 Bitweaver | 1 Bitweaver | 2018-10-15 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in wiki/edit.php in Bitweaver R2 CMS allows remote attackers to obtain sensitive information (script source code) via a .. (dot dot) in the suck_url parameter. | |||||
CVE-2007-6650 | 1 Bitweaver | 1 R2 Cms | 2018-10-15 | 7.5 HIGH | N/A |
Unrestricted file upload vulnerability in fisheye/upload.php in Bitweaver R2 CMS allows remote attackers to upload arbitrary files by using the image/gif content type, and possibly other image and PDF content types, as demonstrated by uploading a .htaccess file. | |||||
CVE-2007-6412 | 1 Bitweaver | 1 Bitweaver | 2018-10-15 | 6.8 MEDIUM | N/A |
Direct static code injection vulnerability in wiki/index.php in Bitweaver 2.0.0 and earlier, when comments are enabled, allows remote attackers to inject arbitrary PHP code via an editcomments action. | |||||
CVE-2007-6374 | 1 Bitweaver | 1 Bitweaver | 2018-10-15 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.0.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) users/register.php or (2) search/index.php, or an editcomments action in (3) wiki/index.php or (4) forums/index.php. NOTE: the error parameter to users/login.php is covered by CVE-2006-3103. | |||||
CVE-2007-6375 | 1 Bitweaver | 1 Bitweaver | 2018-10-15 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in Bitweaver 2.0.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) sort_mode parameter to wiki/list_pages.php and the (2) highlight parameter to search/index.php. NOTE: the researcher also reported injection via JavaScript code in the Search box, but this is probably a forced SQL error or other separate primary issue. |