Page 15 of 73 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The (1) updateuser.php and (2) forums_prune.php scripts in PHP-Fusion 4.00 allow remote attackers to obtain sensitive information via a direct HTTP request, which reveals the installation path in an error message. • http://marc.info/?l=bugtraq&m=109285292901685&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/17036 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in PHP-Fusion 4.01 allows remote attackers to execute arbitrary SQL commands via the rowstart parameter to (1) index.php or (2) members.php, or (3) the comment_id parameter to comments.php. • http://secunia.com/advisories/12686 http://www.osvdb.org/10437 http://www.osvdb.org/10438 http://www.securityfocus.com/bid/11296 https://exchange.xforce.ibmcloud.com/vulnerabilities/17546 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

The ReadMe First.txt file in PHP-Fusion 4.0 instructs users to set the permissions on the fusion_admin/db_backups directory to world read/write/execute (777), which allows remote attackers to download or view database backups, which have easily guessable filenames and contain the administrator username and password. • https://www.exploit-db.com/exploits/24384 http://marc.info/?l=bugtraq&m=109285292901685&w=2 http://secunia.com/advisories/12336 http://www.securityfocus.com/bid/10974 https://exchange.xforce.ibmcloud.com/vulnerabilities/17037 •