Page 2 of 17 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 2

21 Apr 2009 — SQL injection vulnerability in Load.php in Simple Machines Forum (SMF) 1.1.4 and earlier allows remote attackers to execute arbitrary SQL commands by setting the db_character_set parameter to a multibyte character set such as big5, which causes the addslashes PHP function to produce a "\" (backslash) sequence that does not quote the "'" (single quote) character, as demonstrated via a manlabels action to index.php. Vulnerabilidad de inyección SQL en Load.php en Simple Machines Forum (SMF) v1.1.4 y anteriores... • https://www.exploit-db.com/exploits/5826 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

08 Jul 2008 — Simple Machines Forum (SMF) 1.1.x before 1.1.5 and 1.0.x before 1.0.13, when running in PHP before 4.2.0, does not properly seed the random number generator, which has unknown impact and attack vectors. Aplicación Simple Machines Forum (SMF) 1.1.x anterior a v1.1.5 y v1.0.x anterior a v1.0.13, cuando es ejecutada sobre PHP anterior a 4.2.0, no inicializa adecuadamente el generador de números aleatorios, que posee un impacto y vectores de ataque desconocidos. • http://secunia.com/advisories/30955 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

08 Jul 2008 — Unspecified vulnerability in Simple Machines Forum (SMF) 1.1.x before 1.1.5 and 1.0.x before 1.0.13 has unknown impact and attack vectors, probably cross-site scripting (XSS), related to "use of the html-tag." Vulnerabilidad no especificada en Simple Machines Forum (SMF) 1.1.x anterior a 1.1.5 y 1.0.x anterior a 1.0.13, tiene un impacto y vectores de ataque desconocidos, puede que sea una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS), relacionado con el "uso del html-tag". • http://secunia.com/advisories/30955 •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

09 May 2007 — Session fixation vulnerability in Simple Machines Forum (SMF) 1.1.2 and earlier allows remote attackers to hijack web sessions by setting the PHPSESSID parameter. Vulnerabilidad de fijación de sesión en Simple Machines Forum (SMF) 1.1.2 y versiones anteriores permite a atacantes remotos secuestrar sesiones web estableciendo el parámetro PHPSESSID. • http://osvdb.org/35705 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

15 Feb 2007 — QueryString.php in Simple Machines Forum (SMF) 1.0.7 and earlier, and 1.1rc2 and earlier, allows remote attackers to more easily spoof the IP address and evade banning via a modified X-Forwarded-For HTTP header, which is preferred instead of other more reliable sources for the IP address. NOTE: the original researcher claims that the vendor has disputed this issue ** IMPUGNADA ** QueryString.php de Simple Machines Forum (SMF) 1.0.7 y anteriores, y 1.1rc2 y anteriores, permite a atacantes remotos falsear más... • http://securityreason.com/securityalert/2256 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

31 Aug 2006 — Simple Machines Forum (SMF) 1.1RCx before 1.1RC3, and 1.0.x before 1.0.8, does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to perform directory traversal attacks to read arbitrary local files, lock topics, and possibly have other security impacts. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in ... • http://retrogod.altervista.org/smf_11rc2_local_incl.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

11 Dec 2005 — NOTE: this issue has been disputed by the vendor and third parties. SQL injection vulnerability in Memberlist.php in Simple Machines Forum (SMF) 1.1 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter. NOTE: the vendor says that since only one character can be modified, there is no SQL injection. Thus this might be an "invalid SQL syntax error." Multiple followups support the vendor ** DISPUTADA ** El fabricante y terceras partes han disputado este asunto. • http://archives.neohapsis.com/archives/bugtraq/2005-12/0090.html •