Vulnerabilities (CVE)

Filtered by vendor 8pixel.net Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2006-6191 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
SQL injection vulnerability in admin/edit.asp in 8pixel.net simpleblog 2.3 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
CVE-2007-4055 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
SQL injection vulnerability in comments_get.asp in SimpleBlog 3.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: this may be related to CVE-2006-4300.
CVE-2006-6192 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
Unspecified scripts in the admin directory in 8pixel.net SimpleBlog 3.0 and earlier do not properly perform authentication, which allows remote attackers to add users and perform certain other unauthorized privileged actions. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
CVE-2006-0240 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in Simple Blog 2.1 allow remote attackers to execute arbitrary SQL commands via the month parameter in an archives view operation and possibly certain other parameters in unspecified scripts.
CVE-2006-4300 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
SQL injection vulnerability in comments.asp in SimpleBlog 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
CVE-2006-0239 1 8pixel.net 1 Simple Blog 2024-02-04 5.8 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Simple Blog 2.1 allow remote attackers to inject arbitrary web script or HTML via (1) a comment to comments.asp and (2) possibly certain other fields in unspecified scripts.
CVE-2006-4592 1 8pixel.net 1 Simple Blog 2024-02-04 7.5 HIGH N/A
Incomplete blacklist vulnerability in default.asp in 8pixel.net Simple Blog 2.3 and earlier allows remote attackers to conduct SQL injection attacks via ">" characters in the id parameter, which are not filtered by the protection mechanism.