Page 10 of 54 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

PHP remote file inclusion vulnerability in inc-calcul.php3 in SPIP 1.7.2 allows remote attackers to execute arbitrary PHP code via a URL in the squelette_cache parameter, a different vector than CVE-2006-1702. NOTE: this issue has been disputed by third party researchers, stating that the squelette_cache variable is initialized before use, and is only used within the scope of a function ** EN DISPUTA ** Vulnerabilidad de inclusión remota de archivo en PHP en inc-calcul.php3 de SPIP versión 1.7.2 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro squelette_cache parameter, vector distinto de CVE-2006-1702. NOTA: esta característica ha sido cuestionada por investigadores de terceros, que indica que la variable squelette_cache es inicializada antes de su uso, y sólo se utiliza en el ámbito de una función. • http://securityreason.com/securityalert/3056 http://www.securityfocus.com/archive/1/477423/100/0/threaded http://www.securityfocus.com/archive/1/477728/100/0/threaded http://www.securityfocus.com/bid/25416 https://exchange.xforce.ibmcloud.com/vulnerabilities/36218 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in spip_login.php3 in SPIP 1.8.3 allows remote attackers to execute arbitrary PHP code via a URL in the url parameter. • https://www.exploit-db.com/exploits/27589 http://www.securityfocus.com/archive/1/430443/100/0/threaded http://www.securityfocus.com/bid/17423 https://exchange.xforce.ibmcloud.com/vulnerabilities/25711 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in recherche.php3 in SPIP 1.8.2-g allows remote attackers to inject arbitrary web script or HTML via the recherche parameter. • http://www.securityfocus.com/bid/17130 http://www.silitix.com/spip-xss.html http://www.zone-h.fr/advisories/read/id=1105 http://zone.spip.org/trac/spip-zone/changeset/1672 https://exchange.xforce.ibmcloud.com/vulnerabilities/25389 •

CVSS: 6.4EPSS: 3%CPEs: 3EXPL: 3

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3. • https://www.exploit-db.com/exploits/27172 http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html http://secunia.com/advisories/18676 http://securitytracker.com/id?1015602 http://www.osvdb.org/23086 http://www.securityfocus.com/bid/16556 http://www.vupen.com/english/advisories/2006/0483 https://exchange.xforce.ibmcloud.com/vulnerabilities/24600 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 3

SQL injection vulnerability in spip_acces_doc.php3 in SPIP 1.8.2g and earlier allows remote attackers to execute arbitrary SQL commands via the file parameter. • https://www.exploit-db.com/exploits/1482 http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html http://secunia.com/advisories/18676 http://securitytracker.com/id?1015602 http://www.osvdb.org/23087 http://www.securityfocus.com/bid/16551 http://www.vupen.com/english/advisories/2006/0483 https://exchange.xforce.ibmcloud.com/vulnerabilities/24599 •