Page 10 of 55 results (0.004 seconds)

CVSS: 7.5EPSS: 4%CPEs: 18EXPL: 1

PHP remote file inclusion vulnerability in album_portal.php in phpBB modified by Przemo 1.8 allows remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter. • https://www.exploit-db.com/exploits/24026 http://marc.info/?l=bugtraq&m=108244738102532&w=2 http://www.securityfocus.com/bid/10177 https://exchange.xforce.ibmcloud.com/vulnerabilities/15916 •

CVSS: 4.6EPSS: 0%CPEs: 19EXPL: 0

SQL injection vulnerability in groupcp.php for phpBB 2.0.6 and earlier allows group moderators to perform unauthorized activities via the sql_in parameter. • http://marc.info/?l=bugtraq&m=107273069130885&w=2 http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=161943 http://www.securityfocus.com/bid/9314 https://exchange.xforce.ibmcloud.com/vulnerabilities/14096 •

CVSS: 7.5EPSS: 1%CPEs: 19EXPL: 2

SQL injection vulnerability in search.php for phpBB 2.0.6 and earlier allows remote attackers to execute arbitrary SQL and gain privileges via the search_id parameter. • https://www.exploit-db.com/exploits/137 http://marc.info/?l=bugtraq&m=106997132425576&w=2 http://marc.info/?l=bugtraq&m=107005608726609&w=2 http://marc.info/?l=bugtraq&m=107196735102970&w=2 http://www.phpbb.com/phpBB/viewtopic.php?t=153818 http://www.securityfocus.com/bid/9122 https://exchange.xforce.ibmcloud.com/vulnerabilities/13867 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

SQL injection vulnerability in viewtopic.php for phpBB 2.0.5 and earlier allows remote attackers to steal password hashes via the topic_id parameter. Vulnerabilidad de inyección de SQL en viewtopic.php de phpBB 2.0.5 y anteriores permite a atacantes remotos robar picadillos (hashes) de contraseñas mediante el parámetro topic_id. • https://www.exploit-db.com/exploits/44 http://marc.info/?l=bugtraq&m=105607263130644&w=2 http://www.phpbb.com/phpBB/viewtopic.php?t=112052 http://www.securityfocus.com/bid/7979 https://exchange.xforce.ibmcloud.com/vulnerabilities/12366 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code. • http://online.securityfocus.com/archive/1/277318 http://www.securityfocus.com/bid/5038 https://exchange.xforce.ibmcloud.com/vulnerabilities/9370 •