Page 18 of 89 results (0.002 seconds)

CVSS: 7.5EPSS: 37%CPEs: 28EXPL: 2

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string. • https://www.exploit-db.com/exploits/24166 http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html http://marc.info/?l=bugtraq&m=108611606320559&w=2 http://marc.info/?l=bugtraq&m=108611643614881&w=2 http://marc.info/?l=bugtraq&m=108662955105757&w=2 http://secunia.com/advisories/11766 http://www.osvdb.org/6593 http://www.securityfocus.com/bid/10447 https://exchange.xforce.ibmcloud.com/vulnerabi •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in the tep_href_link function in html_output.php for osCommerce before 2.2-MS3 allows remote attackers to inject arbitrary web script or HTML via the osCsid parameter. • https://www.exploit-db.com/exploits/23445 http://osdir.com/ml/web.oscommerce.cvs/2003-12/msg00024.html http://www.oscommerce.com/community/bugs%2C1546 http://www.securityfocus.com/archive/1/347831 http://www.securityfocus.com/bid/9238 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

PHP file inclusion vulnerability in osCommerce 2.1 execute arbitrary commands via the include_file parameter to include_once.php. • https://www.exploit-db.com/exploits/21563 http://online.securityfocus.com/archive/1/277312 http://www.iss.net/security_center/static/9369.php http://www.oscommerce.com/about.php/news%2C72 http://www.securityfocus.com/bid/5037 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in include_once.php in osCommerce (a.k.a. Exchange Project) 2.1 allows remote attackers to execute arbitrary PHP code via the include_file parameter. • https://www.exploit-db.com/exploits/21563 http://archives.neohapsis.com/archives/bugtraq/2002-06/0188.html http://www.iss.net/security_center/static/9369.php http://www.oscommerce.com/about.php/news%2C72 http://www.securityfocus.com/bid/5037 • CWE-94: Improper Control of Generation of Code ('Code Injection') •