Dayfox Designs : Security Vulnerabilities, CVEs,
Multiple directory traversal vulnerabilities in index.php in Dayfox Blog 4 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) p, (2) cat, and (3) archive parameters. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Max CVSS
7.5
EPSS Score
3.46%
Published
2008-08-10
Updated
2017-09-29
Direct static code injection vulnerability in postpost.php in Dayfox Blog (dfblog) 4 allows remote attackers to execute arbitrary PHP code via the cat parameter, which can be executed via a request to posts.php.
Max CVSS
6.8
EPSS Score
14.54%
Published
2007-03-20
Updated
2017-10-11
Multiple PHP remote file inclusion vulnerabilities in index.php in Dayfox Blog allow remote attackers to execute arbitrary PHP code via a URL in the (1) page, (2) subject, and (3) q parameters.
Max CVSS
7.5
EPSS Score
2.37%
Published
2007-01-09
Updated
2018-10-16
Multiple PHP remote file inclusion vulnerabilities in Dayfox Designs Dayfox Blog 2.0 allow remote attackers to execute arbitrary PHP code via a URL in the slogin parameter in the (1) adminlog.php, (2) postblog.php, (3) index.php, or (4) index2.php script in /edit.
Max CVSS
7.5
EPSS Score
1.04%
Published
2006-10-10
Updated
2018-10-17
Dayfox Blog 2.0 and earlier stores user credentials in edit/slog_users.txt under the web document root with insufficient access control, which allows remote attackers to gain privileges.
Max CVSS
7.5
EPSS Score
2.74%
Published
2006-05-22
Updated
2017-07-20
5 vulnerabilities found