Filtered by vendor Wheatblog
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-5921 | 1 Wheatblog | 1 Wheatblog | 2018-10-17 | 5.8 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in add_comment.php in Wheatblog (wB) allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) WWW, and (3) Comment fields. NOTE: this issue may overlap CVE-2006-5195. | |||||
CVE-2006-5922 | 1 Wheatblog | 1 Wheatblog | 2018-10-17 | 5.0 MEDIUM | N/A |
index.php in Wheatblog (wB) allows remote attackers to obtain sensitive information via certain values of the postPtr[] and next parameters, which reveals the path in an error message. | |||||
CVE-2006-4198 | 1 Wheatblog | 1 Wheatblog | 2018-10-17 | 5.1 MEDIUM | N/A |
PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter. | |||||
CVE-2007-3557 | 1 Wheatblog | 1 Wheatblog | 2018-10-15 | 6.8 MEDIUM | N/A |
SQL injection vulnerability in admin/login.php in Wheatblog (wB) 1.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the login parameter. | |||||
CVE-2006-7002 | 1 Wheatblog | 1 Wheatblog | 2008-11-14 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in add_comment.php in Wheatblog (wB) 1.1 allows remote attackers to inject arbitrary web script or HTML via the Email field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this issue may overlap CVE-2006-5195. | |||||
CVE-2006-5195 | 1 Wheatblog | 1 Wheatblog | 2008-09-05 | 6.8 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Wheatblog 1.0 and 1.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained from third party information. |