Filtered by vendor Leif M. Wright
                         Subscriptions
                    
                    
                
                        Filtered by product Web Blog
                         Subscriptions
                    
                    
                
                    Total
                    6 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2004-2347 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| blog.cgi in Leif M. Wright Web Blog 1.1 and 1.1.5 allows remote attackers to execute arbitrary commands via shell metacharacters such as '|' in the file parameter of ViewFile requests. | ||||
| CVE-2006-0844 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| Leif M. Wright's Blog 3.5 does not make a password comparison when authenticating an administrator via a cookie, which allows remote attackers to bypass login authentication, probably by setting the blogAdmin cookie. | ||||
| CVE-2006-0846 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| Multiple cross-site scripting (XSS) vulnerabilities in Leif M. Wright's Blog 3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Referer and (2) User-Agent HTTP headers, which are stored in a log file and not sanitized when the administrator views the "Log" page, possibly using the ViewCommentsLog function. | ||||
| CVE-2006-0845 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| Leif M. Wright's Blog 3.5 allows remote authenticated users with administrative privileges to execute arbitrary programs, including shell commands, by configuring the sendmail path to a malicious pathname. | ||||
| CVE-2004-2127 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| Directory traversal vulnerability in Web Blog 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file variable. | ||||
| CVE-2006-0843 | 1 Leif M. Wright | 1 Web Blog | 2025-04-03 | N/A | 
| Leif M. Wright's Blog 3.5 stores the config file and other txt files under the web root with insufficient access control, which allows remote attackers to read the administrator's password. | ||||
                            
                                
                                
                                    Page 1 of 1.