Page 12 of 93 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 24EXPL: 0

Meilad File upload script (up.php) mod for phpBB 2.0.x does not properly limit the types of files that can be uploaded, which allows remote authenticated users to execute arbitrary commands by uploading PHP files, then directly requesting them from the uploads directory. • http://marc.info/?l=bugtraq&m=111299353030534&w=2 http://securitytracker.com/id?1013671 http://www.defacers.com.mx/advisories/2.txt •

CVSS: 4.3EPSS: 87%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in calendar_scheduler.php in the Topic Calendar 1.0.1 module for phpBB allows remote attackers to inject arbitrary web script or HTML via the start parameter. • https://www.exploit-db.com/exploits/25270 http://marc.info/?l=bugtraq&m=111168190630576&w=2 http://secunia.com/advisories/14659 http://securitytracker.com/id?1013554 https://exchange.xforce.ibmcloud.com/vulnerabilities/19821 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

calendar_scheduler.php in Topic Calendar 1.0.1 module for phpBB, when running on a Microsoft IIS server, allows remote attackers to obtain sensitive information via invalid parameters, which reveal the path in an error message. • http://marc.info/?l=bugtraq&m=111168190630576&w=2 http://secunia.com/advisories/14659 http://securitytracker.com/id?1013554 https://exchange.xforce.ibmcloud.com/vulnerabilities/19824 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in usercp_register.php for phpBB 2.0.13 allows remote attackers to inject arbitrary web script or HTML by setting the (1) allowhtml, (2) allowbbcode, or (3) allowsmilies parameters to inject HTML into signatures for personal messages, possibly when they are processed by privmsg.php or viewtopic.php. • http://neosecurityteam.tk/index.php?pagina=advisories&id=8 http://secunia.com/advisories/14475 http://securitytracker.com/id?1013362 •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 2

phpBB 2.0.13 and earlier allows remote attackers to obtain sensitive information via a direct request to oracle.php, which reveals the path in a PHP error message. • http://marc.info/?l=bugtraq&m=110996579900134&w=2 http://neosecurityteam.net/Advisories/Advisory-09.txt http://neosecurityteam.tk/index.php?pagina=advisories&id=9 http://securitytracker.com/id?1013377 •