Page 19 of 103 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in PHP-Nuke before 6.0 allows remote authenticated users to modify the database and gain privileges via the "bio" argument to modules.php. Vulnerabilidad de inyección de SQL en PHP-Nuke anterior a 6.0 permite a usuarios autenticados remotamente modificar la base de datos y ganar privilegios mediante un argumento "bio" en modules.php • https://www.exploit-db.com/exploits/21977 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0051.html http://marc.info/?l=bugtraq&m=103616324103171&w=2 http://www.idefense.com/advisory/10.31.02c.txt http://www.iss.net/security_center/static/10516.php http://www.osvdb.org/6244 http://www.securityfocus.com/bid/6088 •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 2

index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname. • https://www.exploit-db.com/exploits/21349 http://online.securityfocus.com/archive/1/263337 http://www.iss.net/security_center/static/8618.php http://www.securityfocus.com/bid/4333 •

CVSS: 7.5EPSS: 4%CPEs: 13EXPL: 1

index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. index.php en Francisco Burzi PHP-Nuke 5.3.1 y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario especificando una URL al código malicioso en el parámetro fichero ('file'). • https://www.exploit-db.com/exploits/21230 http://marc.info/?l=bugtraq&m=101121913914205&w=2 http://www.kb.cert.org/vuls/id/221683 http://www.securityfocus.com/bid/3889 https://exchange.xforce.ibmcloud.com/vulnerabilities/7914 •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 2

Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php. • https://www.exploit-db.com/exploits/21166 https://www.exploit-db.com/exploits/21165 http://online.securityfocus.com/archive/1/245691 http://online.securityfocus.com/archive/1/245875 http://online.securityfocus.com/archive/82/243545 http://online.securityfocus.com/archive/82/246603 http://prdownloads.sourceforge.net/phpnuke/PHP-Nuke-5.5.tar.gz http://www.iss.net/security_center/static/7654.php http://www.securityfocus.com/bid/3609 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

PHP-Nuke 5.2 allows remote attackers to copy and delete arbitrary files by calling case.filemanager.php with admin.php as an argument, which sets the $PHP_SELF variable and makes it appear that case.filemanager.php is being called by admin.php instead of the user. • http://marc.info/?l=bugtraq&m=100525739116093&w=2 http://www.iss.net/security_center/static/7478.php http://www.securityfocus.com/bid/3510 •