Page 2 of 12 results (0.012 seconds)

CVSS: 4.3EPSS: 0%CPEs: 8EXPL: 3

Cross-site scripting (XSS) vulnerability in cmd.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to inject arbitrary web script or HTML via an _debug command. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en cmd.php en phpLDAPadmin v1.2.x anterior a v1.2.2, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de un comando _debug. • https://www.exploit-db.com/exploits/18021 http://openwall.com/lists/oss-security/2011/10/24/9 http://openwall.com/lists/oss-security/2011/10/25/2 http://osvdb.org/76593 http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=htdocs/cmd.php%3Bh=0ddf0044355abc94160be73122eb34f3e48ab2d9%3Bhp=34f3848fe4a6d4c00c7c568afa81f59579f5d724%3Bhb=64668e882b8866fae0fa1b25375d1a2f3b4672e2%3Bhpb=caeba72171ade4f588fef1818aa4f6243a68b85e http://phpldapadmin.sourceforge.net/wiki/index.php/Main_Page http://secunia& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 42%CPEs: 8EXPL: 6

The masort function in lib/functions.php in phpLDAPadmin 1.2.x before 1.2.2 allows remote attackers to execute arbitrary PHP code via the orderby parameter (aka sortby variable) in a query_engine action to cmd.php, as exploited in the wild in October 2011. La función masort en lib/functions.php en phpLDAPadmin v1.2.x antes de v1.2.2 permite a atacantes remotos ejecutar código PHP de su elección a través del parámetro orderby (también conocido como la variable SortBy) en una acción query_engine a cmd.php, tal y como fue "explotado" en Octubre de 2011. • https://www.exploit-db.com/exploits/18031 https://www.exploit-db.com/exploits/18021 http://dev.metasploit.com/redmine/issues/5820 http://openwall.com/lists/oss-security/2011/10/24/9 http://openwall.com/lists/oss-security/2011/10/25/2 http://osvdb.org/76594 http://phpldapadmin.git.sourceforge.net/git/gitweb.cgi?p=phpldapadmin/phpldapadmin%3Ba=blobdiff%3Bf=lib/functions.php%3Bh=eb160dc9f7d74e563131e21d4c85d7849a0c6638%3Bhp=19fde9974d4e5eb3bfac04bb223ccbefdb98f9a0%3Bhb=76e6dad13ef77c5448b8dfed1a61e4acc7241165%3Bhpb=5d4245f93ae6 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in cmd.php in phpLDAPadmin 1.1.0.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the cmd parameter. Vulnerabilidad de salto de directorio en cmd.php en phpLDAPadmin v1.1.0.5 permite a atacantes remotos incluir y ejecutar ficheros de su elección mediante los caracteres .. (punto punto) en el parámetro "cmd". • https://www.exploit-db.com/exploits/10410 http://secunia.com/advisories/37848 http://www.exploit-db.com/exploits/10410 http://www.mandriva.com/security/advisories?name=MDVSA-2010:023 http://www.osvdb.org/61139 http://www.securityfocus.com/bid/37327 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 13

Multiple cross-site scripting (XSS) vulnerabilities in phpLDAPadmin 0.9.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) dn parameter in (a) compare_form.php, (b) copy_form.php, (c) rename_form.php, (d) template_engine.php, and (e) delete_form.php; (2) scope parameter in (f) search.php; and (3) Container DN, (4) Machine Name, and (5) UID Number fields in (g) template_engine.php. • https://www.exploit-db.com/exploits/27718 https://www.exploit-db.com/exploits/27717 https://www.exploit-db.com/exploits/27719 https://www.exploit-db.com/exploits/27721 https://www.exploit-db.com/exploits/27722 http://pridels0.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html http://secunia.com/advisories/19747 http://secunia.com/advisories/20124 http://www.debian.org/security/2006/dsa-1057 http://www.osvdb.org/24788 http://www.osvdb.org/24789 http://www&# • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

PHP remote file inclusion vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to execute arbitrary PHP code via the custom_welcome_page parameter. • http://marc.info/?l=bugtraq&m=112542447219235&w=2 http://secunia.com/advisories/16617 http://www.rgod.altervista.org/phpldap.html http://www.securityfocus.com/bid/14695 https://exchange.xforce.ibmcloud.com/vulnerabilities/22103 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •