Required CVE Record Information
Description
admin/index.php in Maian Weblog 4.0 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary weblog_cookie cookie.
References 6 Total
- http://www.maianscriptworld.co.uk/free-php-scripts/maian-weblog/development/index.html
- securityfocus.com: 30209 vdb-entry
- http://www.maianscriptworld.co.uk/news.html
- exchange.xforce.ibmcloud.com: maianweblog-index-security-bypass(43751) vdb-entry
- secunia.com: 30943 third-party-advisory
- exploit-db.com: 6064 exploit
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- http://www.maianscriptworld.co.uk/free-php-scripts/maian-weblog/development/index.html x_transferred
- securityfocus.com: 30209 vdb-entryx_transferred
- http://www.maianscriptworld.co.uk/news.html x_transferred
- exchange.xforce.ibmcloud.com: maianweblog-index-security-bypass(43751) vdb-entryx_transferred
- secunia.com: 30943 third-party-advisoryx_transferred
- exploit-db.com: 6064 exploitx_transferred