Page 19 of 103 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

admin_ug_auth.php in phpBB 2.0.0 allows local users to gain administrator privileges by directly calling admin_ug_auth.php with modifed form fields such as "u". admin_ug_auth.php en phpBB 2.0.0 permite a usuarios locales obtener privilegios de administración llamando directamente a admin_ug_auth.php con campos del formulario modificados tales como el ""u"". • http://archives.neohapsis.com/archives/bugtraq/2002-10/0385.html http://www.iss.net/security_center/static/10489.php http://www.osvdb.org/4284 http://www.securityfocus.com/bid/6056 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode. • https://www.exploit-db.com/exploits/22065 http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html http://www.securityfocus.com/bid/6311 https://exchange.xforce.ibmcloud.com/vulnerabilities/10773 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in viewtopic.php in phpBB 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the highlight parameter. • http://online.securityfocus.com/archive/1/300362 http://www.iss.net/security_center/static/10653.php http://www.phpbb.com/phpBB/viewtopic.php?t=56283 http://www.securityfocus.com/bid/6195 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 3

SQL injection vulnerability in Gender MOD 1.1.3 allows remote attackers to gain administrative access via the user_level parameter in the User Profile page. • https://www.exploit-db.com/exploits/21660 http://online.securityfocus.com/archive/1/284691 http://www.iss.net/security_center/static/9692.php http://www.securityfocus.com/bid/5342 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

install.php in phpBB 2.0 through 2.0.1, when "allow_url_fopen" and "register_globals" variables are set to "on", allows remote attackers to execute arbitrary PHP code by modifying the phpbb_root_dir parameter to reference a URL on a remote web server that contains the code. • http://online.securityfocus.com/archive/1/277318 http://www.securityfocus.com/bid/5038 https://exchange.xforce.ibmcloud.com/vulnerabilities/9370 •