Lucene search

K

Katywhitton Security Vulnerabilities

cve
cve

CVE-2009-0335

Cross-site scripting (XSS) vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to inject arbitrary web script or HTML via the view...

5.8AI Score

0.002EPSS

2009-01-29 06:30 PM
23
cve
cve

CVE-2009-0337

SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party...

8.4AI Score

0.002EPSS

2009-01-29 06:30 PM
21
cve
cve

CVE-2009-0336

Katy Whitton BlogIt! stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request for database/Blog.mdb. NOTE: some of these details are obtained from third party...

6.6AI Score

0.002EPSS

2009-01-29 06:30 PM
18
cve
cve

CVE-2009-0334

SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the day parameter in an archive...

8.7AI Score

0.001EPSS

2009-01-29 06:30 PM
24
cve
cve

CVE-2009-0248

Cross-site scripting (XSS) vulnerability in rankup.asp in Katy Whitton RankEm allows remote attackers to inject arbitrary web script or HTML via the siteID...

5.9AI Score

0.002EPSS

2009-01-22 04:30 PM
19
cve
cve

CVE-2009-0249

Katy Whitton RankEm stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for...

6.5AI Score

0.002EPSS

2009-01-22 04:30 PM
22
cve
cve

CVE-2008-5588

SQL injection vulnerability in rankup.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the siteID...

8.4AI Score

0.001EPSS

2008-12-16 07:07 PM
19
cve
cve

CVE-2008-5589

SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpassword parameter (aka password field). NOTE: some of these details are obtained from third party...

8.5AI Score

0.001EPSS

2008-12-16 07:07 PM
20