
CVE-2007-2492 – PostNuke Module v4bJournal - SQL Injection
https://notcve.org/view.php?id=CVE-2007-2492
04 May 2007 — SQL injection vulnerability in index.php in the v4bJournal module for PostNuke allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a journal_comment action. Vulnerabilidad de inyección SQL en index.php en el módulo v4bJournal para PostNuke, permite a usuarios remotos autenticados ejecutar comandos SQL de su elección mediante el parámetro id en una acción journal_comment. • https://www.exploit-db.com/exploits/3835 •

CVE-2007-0386
https://notcve.org/view.php?id=CVE-2007-0386
19 Jan 2007 — Unspecified vulnerability in the rating section in PostNuke 0.764 has unknown impact and attack vectors, related to "an interesting bug." Vulnerabilidad no especificada en la sección rating en PostNuke 0.764 tiene un impacto desconocido y vectores de ataque, relacionado con "un bug interesante". • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVE-2007-0384
https://notcve.org/view.php?id=CVE-2007-0384
19 Jan 2007 — Cross-site scripting (XSS) vulnerability in preview in the reviews section in PostNuke 0.764 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilida de secuencias de comandos en sitios cruzados (XSS) en preview en la sección reviews en PostNuke 0.764 permite a atacantes remotos inyectar secuencias de comando web o HTML a través de vectores no especificados. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVE-2007-0385
https://notcve.org/view.php?id=CVE-2007-0385
19 Jan 2007 — The faq section in PostNuke 0.764 allows remote attackers to obtain sensitive information (the full path) via "unvalidated output" in FAQ/index.php, possibly involving an undefined id_cat variable. La sección faq en Postnuke 0.764 permite a atacantes remotos obtener información sensible (la ruta completa) a través "salidas no validas) en FAQ/index.php, posiblemente afectando a la variable no definida id_cat. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVE-2006-6267
https://notcve.org/view.php?id=CVE-2006-6267
04 Dec 2006 — PostNuke 0.7.5.0, and certain minor versions, allows remote attackers to obtain sensitive information via a non-numeric value of the stop parameter, which reveals the path in an error message. PostNuke 0.7.5.0, y otras versiones concretas sin importancia, permiten a atacantes remotos la obtención de información sensible a través de un valor no numérico en el parámetro stop, el cual muestra la ruta en un mensaje de error. • http://www.securityfocus.com/archive/1/452283/100/100/threaded •

CVE-2006-6233
https://notcve.org/view.php?id=CVE-2006-6233
02 Dec 2006 — SQL injection vulnerability in the Downloads module for unknown versions of PostNuke allows remote attackers to execute arbitrary SQL commands via the lid parameter in a viewdownloaddetails operation. NOTE: this issue might have been in the viewdownloaddetails function in dl-downloaddetails.php, but PostNuke 0.764 does not appear to have this issue. Vulnerabilidad de inyección SQL en el módulo Downloads para versiones desconocidas de PostNuke permite a un atacante remoto ejecutar comandos SQL de su elección... • http://securityreason.com/securityalert/1952 •

CVE-2006-5733 – PostNuke 0.763 - 'PNSV lang' Remote Code Execution
https://notcve.org/view.php?id=CVE-2006-5733
06 Nov 2006 — Directory traversal vulnerability in error.php in PostNuke 0.763 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php. Vulnerabilidad de escalado de directorio en error.php en PostNuke 0.7.63 y anteriores permite a atacantes remotos incluir y ejecutar archivos locales de su elección mediante un .. (punto punto) ... • https://www.exploit-db.com/exploits/2707 •

CVE-2006-5121
https://notcve.org/view.php?id=CVE-2006-5121
02 Oct 2006 — SQL injection vulnerability in modules/Downloads/admin.php in the Admin section of PostNuke 0.762 allows remote attackers to execute arbitrary SQL commands via the hits parameter. Vulnerabilidad de inyección SQL en modules/Downloads/admin.php en la sección Admin de PostNuke 0.762 permite a un atacante remoto ejecutar comandos SQL de su elección a través del parámetro hits. • http://community.postnuke.com/index.php?name=News&file=article&sid=2783 •

CVE-2006-0800 – PostNuke 0.6x/0.7x NS-Languages Module - 'language' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2006-0800
20 Feb 2006 — Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php. • https://www.exploit-db.com/exploits/27254 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2006-0801 – PostNuke 0.6x/0.7x NS-Languages Module - 'language' SQL Injection
https://notcve.org/view.php?id=CVE-2006-0801
20 Feb 2006 — SQL injection vulnerability in the NS-Languages module for PostNuke 0.761 and earlier, when magic_quotes_gpc is off, allows remote attackers to execute arbitrary SQL commands via the language parameter to admin.php. • https://www.exploit-db.com/exploits/27255 •