Page 18 of 97 results (0.008 seconds)

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 2

index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname. • https://www.exploit-db.com/exploits/21349 http://online.securityfocus.com/archive/1/263337 http://www.iss.net/security_center/static/8618.php http://www.securityfocus.com/bid/4333 •

CVSS: 7.5EPSS: 4%CPEs: 13EXPL: 1

index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. index.php en Francisco Burzi PHP-Nuke 5.3.1 y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario especificando una URL al código malicioso en el parámetro fichero ('file'). • https://www.exploit-db.com/exploits/21230 http://marc.info/?l=bugtraq&m=101121913914205&w=2 http://www.kb.cert.org/vuls/id/221683 http://www.securityfocus.com/bid/3889 https://exchange.xforce.ibmcloud.com/vulnerabilities/7914 •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 2

Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php. • https://www.exploit-db.com/exploits/21166 https://www.exploit-db.com/exploits/21165 http://online.securityfocus.com/archive/1/245691 http://online.securityfocus.com/archive/1/245875 http://online.securityfocus.com/archive/82/243545 http://online.securityfocus.com/archive/82/246603 http://prdownloads.sourceforge.net/phpnuke/PHP-Nuke-5.5.tar.gz http://www.iss.net/security_center/static/7654.php http://www.securityfocus.com/bid/3609 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

PHP-Nuke 5.2 allows remote attackers to copy and delete arbitrary files by calling case.filemanager.php with admin.php as an argument, which sets the $PHP_SELF variable and makes it appear that case.filemanager.php is being called by admin.php instead of the user. • http://marc.info/?l=bugtraq&m=100525739116093&w=2 http://www.iss.net/security_center/static/7478.php http://www.securityfocus.com/bid/3510 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

PHP-Nuke 5.1 stores user and administrator passwords in a base-64 encoded cookie, which could allow remote attackers to gain privileges by stealing or sniffing the cookie and decoding it. • http://marc.info/?l=bugtraq&m=100638850219503&w=2 http://www.securityfocus.com/bid/3567 https://exchange.xforce.ibmcloud.com/vulnerabilities/7596 •