Multiple cross-site scripting (XSS) vulnerabilities in eggblog 3.1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) edit parameter to (a) admin/articles.php or (b) admin/comments.php, or the (2) add parameter to admin/users.php.
Max CVSS
6.8
EPSS Score
0.20%
Published
2006-11-22
Updated
2017-07-20
Cross-site scripting (XSS) vulnerability in Epicdesigns tinyBB 0.3 allow remote attackers to inject arbitrary web script or HTML via the q parameter in forgot.php, which is echoed in an error message, and other unspecified vectors.
Max CVSS
6.8
EPSS Score
12.06%
Published
2006-06-01
Updated
2018-10-18
Multiple SQL injection vulnerabilities in Epicdesigns tinyBB 0.3 allow remote attackers to execute arbitrary SQL commands via the (1) q parameter in (a) forgot.php, and the (2) username and (3) password parameters in (b) login.php, and other unspecified vectors.
Max CVSS
6.8
EPSS Score
2.65%
Published
2006-06-01
Updated
2018-10-18
home/register.php in Eggblog before 3.0 allows remote attackers to change the password of administrators and possibly other users via a modified username parameter.
Max CVSS
7.5
EPSS Score
1.94%
Published
2006-06-01
Updated
2018-10-18
SQL injection vulnerability in rss/posts.php in Eggblog before 3.07 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Max CVSS
6.4
EPSS Score
1.19%
Published
2006-06-01
Updated
2018-10-18
SQL injection vulnerability in eggblog 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to blog.php.
Max CVSS
7.5
EPSS Score
0.97%
Published
2006-01-21
Updated
2017-07-20
search.php in eggblog 2.0 allows remote attackers to obtain the full path via an invalid q parameter, as used by the Keyword and Search fields, possibly due to an SQL injection vulnerability.
Max CVSS
7.8
EPSS Score
1.33%
Published
2005-12-28
Updated
2017-07-20
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!