2 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

vBSeo before 3.6.0PL2 allows XSS via the member.php u parameter. vBSeo versiones anteriores a 3.6.0PL2, permite un ataque de tipo XSS por medio del parámetro u del archivo member.php. • https://www.exploit-db.com/exploits/37944 https://www.securityfocus.com/bid/55908 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 92%CPEs: 35EXPL: 4

The proc_deutf function in includes/functions_vbseocp_abstract.php in vBSEO 3.5.0, 3.5.1, 3.5.2, 3.6.0, and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" in the char_repl parameter, which is inserted into a regular expression that is processed by the preg_replace function with the eval switch. La función proc_deutf en includes/functions_vbseocp_abstract.php en vBSEO v3.5.0, v3.5.1, v3.5.2, v3.6.0, y anteriores permite a atacantes remotos insertar y ejecutar código PHP a través "complex curly syntax" en el parámetro char_repl, el cual es insertado en una expresión regular que es procesada por la función preg_replace con el modificador eval. • https://www.exploit-db.com/exploits/18424 http://osvdb.org/78508 http://secunia.com/advisories/47699 http://www.exploit-db.com/exploits/18424 http://www.securityfocus.com/bid/51647 http://www.vbseo.com/f5/vbseo-security-bulletin-all-supported-versions-patch-release-52783 https://exchange.xforce.ibmcloud.com/vulnerabilities/72689 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/vbseo_proc_deutf.rb • CWE-94: Improper Control of Generation of Code ('Code Injection') •