Filtered by vendor Boastmachine
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-0422 | 1 Boastmachine | 1 Boastmachine | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in mail.php in boastMachine (aka bMachine) 3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. | |||||
CVE-2007-5417 | 1 Boastmachine | 1 Boastmachine | 2024-11-21 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in index.php in boastMachine (aka bMachine) 2.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter. | |||||
CVE-2007-2932 | 1 Boastmachine | 1 Boastmachine | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in index.php in BoastMachine allows remote attackers to inject arbitrary web script or HTML via the blog parameter in a content search action. | |||||
CVE-2007-2860 | 1 Boastmachine | 1 Boastmachine | 2024-11-21 | 6.5 MEDIUM | N/A |
user.php in BoastMachine 3.0 platinum allows remote authenticated users to gain privileges via a modified id parameter, as demonstrated by an edit_post action. | |||||
CVE-2006-2491 | 2 Boastmachine, Kailash Nadh | 2 Boastmachine, Boastmachine | 2024-11-21 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in (1) index.php and (2) bmc/admin.php in BoastMachine (bMachine) 3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly filtered when it is accessed using the $_SERVER["PHP_SELF"] variable. | |||||
CVE-2006-0131 | 1 Boastmachine | 1 Boastmachine | 2024-11-21 | 5.0 MEDIUM | N/A |
boastMachine 3.1 allows remote attackers to obtain sensitive information via a direct request to (1) footer.php and (2) side_menu.php, which reveals the path in an error message. | |||||
CVE-2005-1580 | 1 Boastmachine | 1 Boastmachine | 2024-11-20 | 7.5 HIGH | N/A |
users.ini.php in BoastMachine 3.0 does not properly restrict the types of files that can be uploaded, which allows remote attackers to execute arbitrary code. |