Page 25 of 179 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GET/POST/COOKIE (GPC) variable and a GLOBALS[] variable with the same name, which causes phpBB to unset the GLOBALS[] variable but not the GPC variable. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20386 http://www.securityfocus.com/bid/15243 https://exchange.xforce.ibmcloud.com/vulnerabilities/22914 •

CVSS: 4.3EPSS: 0%CPEs: 27EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.17 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) error_msg parameter to usercp_register.php, (2) forward_page parameter to login.php, and (3) list_cat parameter to search.php, which are not initialized as variables. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20387 http://www.osvdb.org/20388 http://www.osvdb.org/20389 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when the register_long_arrays directive is disabled, allows remote attackers to modify global variables and bypass security mechanisms because PHP does not define the associated HTTP_* variables. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20414 http://www.securityfocus.com/bid/15243 •

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 1

Interpretation conflict in phpBB 2.0.17, with remote avatars and avatar uploading enabled, allows remote authenticated users to inject arbitrary web script or HTML via an HTML file with a GIF or JPEG file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer, which renders malformed image types as HTML, enabling cross-site scripting (XSS) attacks. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer (CVE-2005-3312) and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in phpBB. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0479.html http://marc.info/?l=bugtraq&m=113017003617987&w=2 http://secunia.com/advisories/17295 http://secunia.com/advisories/18098 http://www.debian.org/security/2005/dsa-925 http://www.securityfocus.com/bid/15170 https://exchange.xforce.ibmcloud.com/vulnerabilities/22837 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in phpBB 2.0.16 allows remote attackers to inject arbitrary web script or HTML via nested [url] tags. • http://marc.info/?l=bugtraq&m=112059951605939&w=2 http://www.debian.org/security/2005/dsa-768 http://www.securitylab.ru/55612.html •