Page 2 of 8 results (0.002 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

The show_files function in RunCms 1.5.2 and earlier allows remote attackers to obtain sensitive information (file existence and file metadata) via unspecified vectors. La función show_files de RunCms 1.5.2 y anteriores permite a atacantes remotos obtener información sensible (existencia de fichero y metadatos de fichero) a través de vectores no especificados. • https://www.exploit-db.com/exploits/3850 http://osvdb.org/35783 http://retrogod.altervista.org/runcms_152_sql.html http://securityreason.com/securityalert/2671 http://www.securityfocus.com/archive/1/467665/100/0/threaded http://www.securityfocus.com/bid/23819 http://www.vupen.com/english/advisories/2007/1669 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 2

SQL injection vulnerability in class/debug/debug_show.php in RunCms 1.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the executed_queries array parameter. Vulnerabilidad de inyección SQL en class/debug/debug_show.php de RunCms 1.5.2 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro de tipo array executed_queries. • https://www.exploit-db.com/exploits/3850 http://osvdb.org/35782 http://retrogod.altervista.org/runcms_152_sql.html http://secunia.com/advisories/25154 http://securityreason.com/securityalert/2671 http://www.runcms.org/modules/news http://www.securityfocus.com/archive/1/467665/100/0/threaded http://www.securityfocus.com/bid/23819 http://www.vupen.com/english/advisories/2007/1669 https://exchange.xforce.ibmcloud.com/vulnerabilities/34075 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL injection vulnerabilities in RunCMS 1.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) uid parameter in (a) class/sessions.class.php, and the (2) timezone_offset and (3) umode parameters in (b) class/xoopsuser.php. Múltiples vulnerabilidades de inyección SQL en RunCMS 1.4.1 permiten a un atacante remoto ejecutar comandos SQL de su elección a través del (1) parámetro uid en (a) class/sessiones.class.php, y el (2) timezone_offset y (3) umode parameters en (b) class/xoopsuser.php. • http://secunia.com/advisories/21814 http://securityreason.com/securityalert/1532 http://www.hackers.ir/advisories/runcms.html http://www.osvdb.org/28616 http://www.osvdb.org/28617 http://www.runcms.org/modules/mydownloads/viewcat.php?cid=5 http://www.securityfocus.com/archive/1/445524/100/0/threaded http://www.securityfocus.com/bid/19913 http://www.vupen.com/english/advisories/2006/3522 https://exchange.xforce.ibmcloud.com/vulnerabilities/28806 •