Page 16 of 103 results (0.007 seconds)

CVSS: 7.5EPSS: 3%CPEs: 16EXPL: 1

PHP remote file inclusion vulnerability in admin_cash.php for the Cash Mod module for phpBB allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_path parameter to reference a URL on a remote web server that contains the code. • https://www.exploit-db.com/exploits/24751 http://marc.info/?l=bugtraq&m=110075903308817&w=2 http://marc.info/?l=bugtraq&m=110082153702843&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/18151 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in privmsg.php in phpBB 2.0.6 allow remote attackers to execute arbitrary script or HTML via the (1) folder or (2) mode variables. • https://www.exploit-db.com/exploits/23475 http://marc.info/?l=bugtraq&m=107530946123822&w=2 http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=161943 http://www.securityfocus.com/bid/9290 •

CVSS: 7.5EPSS: 96%CPEs: 29EXPL: 4

viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm. • https://www.exploit-db.com/exploits/12510 https://www.exploit-db.com/exploits/647 https://www.exploit-db.com/exploits/16890 https://www.exploit-db.com/exploits/24274 http://marc.info/?l=bugtraq&m=110029415208724&w=2 http://marc.info/?l=bugtraq&m=110365752909029&w=2 http://marc.info/?t=110079440800004&r=1&w=2 http://secunia.com/advisories/13239 http://www.kb.cert.org/vuls/id/497400 http://www.phpbb.com/phpBB/viewtopic.php?t=240513 http://www. •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in PhpBB 2.0.8 allow remote attackers to inject arbitrary web script or HTML via (1) the cat_title parameter in index.php, (2) the faq[0][0] parameter in lang_faq.php as accessible from faq.php, or (3) the faq[0][0] parameter in lang_bbcode.php as accessible from faq.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en phpBB 2.0.8 permite a atacantes remotos inyectar scritp web o HTML de su elección mediante (1) el parámetro cat_title en index.php (2) el parámetro faq[0][0] en lang_faq.php, cuando se accede desde faq.php, o (3) el parámetro faq[0][0] en lang_bbcode cuando se accede desde faq.php. • http://marc.info/?l=bugtraq&m=108999024506020&w=2 http://www.securityfocus.com/bid/10738 http://www.waraxe.us/index.php?modname=sa&id=34 https://exchange.xforce.ibmcloud.com/vulnerabilities/16724 https://exchange.xforce.ibmcloud.com/vulnerabilities/16725 https://exchange.xforce.ibmcloud.com/vulnerabilities/16726 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

PhpBB 2.0.8 allows remote attackers to gain sensitive information via an invalid (1) category_rows parameter to index.php, (2) faq parameter to faq.php, or (3) ranksrow parameter to profile.php, which reveal the full path in an error message. phpBB 2.0.8 permiteaatacantes remotos obtener información sensible mediante parámetros inválidos: (1) category_rows a index.php, (2) faq a faq.php, o (3) ranksrow a profile.php, lo que revela la ruta completa en el mensaje de error. • http://marc.info/?l=bugtraq&m=108999024506020&w=2 http://www.waraxe.us/index.php?modname=sa&id=34 https://exchange.xforce.ibmcloud.com/vulnerabilities/16716 https://exchange.xforce.ibmcloud.com/vulnerabilities/16720 https://exchange.xforce.ibmcloud.com/vulnerabilities/16723 •