Filtered by vendor Myblog
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-2082 | 1 Myblog | 1 Myblog | 2018-10-16 | 6.5 MEDIUM | N/A |
Direct static code injection vulnerability in admin/settings.php in MyBlog 0.9.8 and earlier allows remote authenticated admin users to inject arbitrary PHP code via the content parameter, which can be executed by accessing index.php. NOTE: a separate vulnerability could be leveraged to make this issue exploitable by remote unauthenticated attackers. | |||||
CVE-2007-2081 | 1 Myblog | 1 Myblog | 2018-10-16 | 7.5 HIGH | N/A |
MyBlog 0.9.8 and earlier allows remote attackers to bypass authentication requirements via the admin cookie parameter to certain admin files, as demonstrated by admin/settings.php. | |||||
CVE-2008-6193 | 1 Myblog | 1 Myblog | 2017-09-28 | 5.0 MEDIUM | N/A |
Sam Crew MyBlog stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information. | |||||
CVE-2008-4341 | 1 Myblog | 1 Myblog | 2017-09-28 | 7.5 HIGH | N/A |
add.php in MyBlog 0.9.8 and earlier allows remote attackers to bypass authentication and gain administrative access by setting a cookie with admin=yes and login=admin. | |||||
CVE-2008-2963 | 1 Myblog | 1 Myblog | 2017-09-28 | 6.8 MEDIUM | N/A |
Multiple SQL injection vulnerabilities in MyBlog allow remote attackers to execute arbitrary SQL commands via the (1) view parameter to (a) index.php, and the (2) id parameter to (b) member.php and (c) post.php. | |||||
CVE-2008-2962 | 1 Myblog | 1 Myblog | 2017-09-28 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in MyBlog allow remote attackers to inject arbitrary web script or HTML via the (1) s and (2) sort parameters to index.php, and the (3) id parameter to post.php. | |||||
CVE-2010-1540 | 2 Joomla, Myblog | 2 Joomla\!, Com Myblog | 2010-05-23 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. NOTE: some of these details are obtained from third party information. |