Page 2 of 21 results (0.004 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

Unrestricted file upload vulnerability in Jetbox CMS allows remote authenticated users with author privileges to upload arbitrary scripts via unspecified vectors, which can be accessed in webfiles/. NOTE: this issue might be a duplicate of CVE-2004-1448. Vulnerabilidad de envío de archivo no restringido en Jetbox CMS permite a usuarios autenticados remotamente con privilegios de autor enviar secuencias de comandos de su elección mediante vectores no especificados, los cuales pueden ser accedidos en webfiles/. NOTA: este problema podría ser un duplicado de CVE-2004-1448. • http://osvdb.org/37450 http://securityreason.com/securityalert/2711 http://www.securityfocus.com/archive/1/468681/100/0/threaded http://www.securityfocus.com/bid/23996 •

CVSS: 4.0EPSS: 2%CPEs: 1EXPL: 1

CRLF injection vulnerability in formmail.php in Jetbox CMS 2.1 might allow remote attackers to inject arbitrary e-mail headers via LF (%0A) sequences in the subject parameter, a related issue to CVE-2007-1898. Vulnerabilidad de inyección CRLF en formmail.php en Jetbox CMS 2.1 podría permitir a atacantes remotos inyectar cabeceras de e-mail de su elección a través de secuencias LF(%0A) en el parámetro subject, un asunto relacionado con CVE-2007-1898. • http://securityreason.com/securityalert/2710 http://www.netvigilance.com/advisory0026 http://www.osvdb.org/34088 http://www.securityfocus.com/archive/1/468644/100/0/threaded http://www.securityfocus.com/bid/23989 http://www.securitytracker.com/id?1018063 http://www.vupen.com/english/advisories/2007/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/34292 •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in Jetbox CMS allow remote attackers to inject arbitrary web script or HTML via the (1) path parameter to view/search/; or the (2) companyname, (3) country, (4) email, (5) firstname, (6) middlename, (7) required, (8) surname, or (9) title parameter to view/supplynews/. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Jetbox CMS permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro (1) path en view/search/; o el parámetro (2) companyname, (3) country, (4) email, (5) firstname, (6) middlename, (7) required, (8) surname, o (9) title en view/supplynews/. • https://www.exploit-db.com/exploits/30041 https://www.exploit-db.com/exploits/30042 http://osvdb.org/37451 http://osvdb.org/37452 http://securityreason.com/securityalert/2711 http://www.securityfocus.com/archive/1/468681/100/0/threaded http://www.securityfocus.com/bid/23999 http://www.vupen.com/english/advisories/2007/1831 •

CVSS: 5.8EPSS: 4%CPEs: 16EXPL: 1

formmail.php in Jetbox CMS 2.1 allows remote attackers to send arbitrary e-mails (spam) via modified recipient, _SETTINGS[allowed_email_hosts][], and subject parameters. formmail.php en Jetbox CMS 2.1 permite a atacantes remotos envíar e-mails de su elección a través de recipientes modificados, a través de los parámetros _SETTINGS[allowed_email_hosts][], y subject. Jetbox CMS version 2.1 suffers from an e-mail injection vulnerability that allows for spamming. • https://www.exploit-db.com/exploits/30040 http://securityreason.com/securityalert/2710 http://www.netvigilance.com/advisory0026 http://www.osvdb.org/34088 http://www.securityfocus.com/archive/1/468644/100/0/threaded http://www.securityfocus.com/bid/23989 http://www.securitytracker.com/id?1018063 http://www.vupen.com/english/advisories/2007/1831 https://exchange.xforce.ibmcloud.com/vulnerabilities/34292 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Jetbox CMS allows remote attackers to obtain sensitive information via a direct request for certain files, which reveal the path in an error message. Jetbox CMS permite a un atacante remoto obtener información sensible a través de una respuesta directa de ciertos ficheros, los cuales revelan el camino en un mensaje de error. • http://securityreason.com/securityalert/1562 http://www.securityfocus.com/archive/1/445652/100/0/threaded http://www.securityfocus.com/bid/19303 https://exchange.xforce.ibmcloud.com/vulnerabilities/28844 •