CVE-2005-0854

betaparticle blog (bp blog), posisbly before version 4, allows remote attackers to bypass authentication and (1) upload files via a direct request to upload.asp or (2) delete files via a direct request to myFiles.asp.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:betaparticle:betaparticle_blog:2.0:*:*:*:*:*:*:*
cpe:2.3:a:betaparticle:betaparticle_blog:3.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () http://blog.betaparticle.com/template_permalink.asp?id=68 - () http://blog.betaparticle.com/template_permalink.asp?id=68 -
References () http://seclists.org/lists/bugtraq/2005/Mar/0360.html - () http://seclists.org/lists/bugtraq/2005/Mar/0360.html -
References () http://secunia.com/advisories/14668 - Patch, Vendor Advisory () http://secunia.com/advisories/14668 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/12861 - Exploit () http://www.securityfocus.com/bid/12861 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19781 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19781 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-0854

Mitre link : CVE-2005-0854

CVE.ORG link : CVE-2005-0854


JSON object : View

Products Affected

betaparticle

  • betaparticle_blog