Page 2 of 9 results (0.009 seconds)

CVSS: 5.1EPSS: 11%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in index.php in Knusperleicht newsReporter 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the news_include_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en index.php en Knusperleicht newsReporter 1.1 y anteriores permiten a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro news_include_path. • https://www.exploit-db.com/exploits/2101 http://secunia.com/advisories/21312 http://securityreason.com/securityalert/1326 http://www.securityfocus.com/archive/1/441808/100/0/threaded http://www.securityfocus.com/bid/19275 http://www.vupen.com/english/advisories/2006/3092 https://exchange.xforce.ibmcloud.com/vulnerabilities/28095 •

CVSS: 5.1EPSS: 41%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in index.php in Knusperleicht Shoutbox 4.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sb_include_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en index.php en Knusperleicht Shoutbox 4.4 y anteriores permiten a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro sb_include_path. • https://www.exploit-db.com/exploits/2103 http://secunia.com/advisories/21302 http://securityreason.com/securityalert/1325 http://www.osvdb.org/27709 http://www.securityfocus.com/archive/1/441815/100/0/threaded http://www.securityfocus.com/bid/19273 http://www.vupen.com/english/advisories/2006/3090 https://exchange.xforce.ibmcloud.com/vulnerabilities/28123 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in quickie.php in Knusperleicht Quickie, probably 0.2, allows remote attackers to execute arbitrary PHP code via a URL in the QUICK_PATH parameter. Vulnerabilidad PHP de inclusión remota de archivo en quickie.php en Knusperleicht Quickie, probablemente 0.2, permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro QUICK_PATH. • https://www.exploit-db.com/exploits/28318 http://securityreason.com/securityalert/1321 http://www.securityfocus.com/archive/1/441814/100/0/threaded http://www.securityfocus.com/bid/19271 https://exchange.xforce.ibmcloud.com/vulnerabilities/28125 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Shoutbox SCRIPT 3.0.2 and earlier allows remote attackers to obtain sensitive information via a direct request to db/settings.dat, which displays usernames and password hashes. • http://marc.info/?l=bugtraq&m=111402253108991&w=2 http://secunia.com/advisories/15015 http://www.osvdb.org/15695 https://exchange.xforce.ibmcloud.com/vulnerabilities/20177 •