Vulnerabilities > Tuxplanet

DATE CVE VULNERABILITY TITLE RISK
2008-07-25 CVE-2008-3304 Information Exposure vulnerability in Tuxplanet Bilboblog 0.2.1
BilboBlog 0.2.1 allows remote attackers to obtain sensitive information via (1) an enable_cache=false query string to footer.php or (2) a direct request to pagination.php, which reveals the installation path in an error message.
network
low complexity
tuxplanet CWE-200
5.0
2008-07-25 CVE-2008-3303 Permissions, Privileges, and Access Controls vulnerability in Tuxplanet Bilboblog 0.2.1
admin/login.php in BilboBlog 0.2.1, when register_globals is enabled, allows remote attackers to bypass authentication and obtain administrative access via a direct request that sets the login, admin_login, password, and admin_passwd parameters.
network
tuxplanet CWE-264
6.8
2008-07-25 CVE-2008-3302 SQL Injection vulnerability in Tuxplanet Bilboblog 0.2.1
SQL injection vulnerability in admin/delete.php in BilboBlog 0.2.1, when magic_quotes_gpc is disabled, allows remote authenticated administrators to execute arbitrary SQL commands via the num parameter.
network
tuxplanet CWE-89
6.0
2008-07-25 CVE-2008-3301 Cross-Site Scripting vulnerability in Tuxplanet Bilboblog 0.2.1
Multiple cross-site scripting (XSS) vulnerabilities in BilboBlog 0.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) content parameter to admin/update.php, related to conflicting code in widget.php; and allow remote attackers to inject arbitrary web script or HTML via the (2) titleId parameter to head.php, reachable through index.php; the (3) t_lang[lang_copyright] parameter to footer.php; the (4) content parameter to the default URI under admin/; the (5) url, (6) t_lang[lang_admin_help], (7) t_lang[lang_admin_clear_cache], (8) t_lang[lang_admin_home], and (9) t_lang[lang_admin_logout] parameters to admin/homelink.php; and the (10) t_lang[lang_admin_new_post] parameter to admin/post.php.
network
tuxplanet CWE-79
3.5