CVE-2007-1966
https://notcve.org/view.php?id=CVE-2007-1966
Session fixation vulnerability in eXV2 CMS 2.0.4.3 and earlier allows remote attackers to hijack web sessions by setting the PHPSESSID cookie. Vulnerabilidad de fijación de sesión en eXV2 CMS 2.0.4.3 y anteriores permite a atacantes remotos secuestrar sesiones web estableciendo la cookie PHPSESSID. • http://marc.info/?l=bugtraq&m=117570977117962&w=2 http://www.majorsecurity.de/index_2.php?major_rls=major_rls38 • CWE-287: Improper Authentication •
CVE-2007-1965
https://notcve.org/view.php?id=CVE-2007-1965
Multiple cross-site scripting (XSS) vulnerabilities in eXV2 CMS 2.0.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the set_lang parameter to (1) archive.php, (2) article.php, (3) index.php, or (4) topics.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en eXV2 CMS 2.0.4.3 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a (1) archive.php, (2) article.php, (3) index.php, o (4) topics.php. • http://marc.info/?l=bugtraq&m=117570977117962&w=2 http://www.majorsecurity.de/index_2.php?major_rls=major_rls38 http://www.securityfocus.com/bid/23314 •
CVE-2007-1907 – Pathos CMS 0.92-2 - 'warn.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-1907
PHP remote file inclusion vulnerability in warn.php in Pathos Content Management System (CMS) 0.92-2 allows remote attackers to execute arbitrary PHP code via a URL in the file parameter. Vulnerabilidad de inclusión remota de archivo en PHP en warn.php de Pathos Content Management System (CMS) 0.92-2 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro file. • https://www.exploit-db.com/exploits/3696 http://osvdb.org/37394 http://www.securityfocus.com/bid/23393 http://www.vupen.com/english/advisories/2007/1321 https://exchange.xforce.ibmcloud.com/vulnerabilities/33536 •
CVE-2006-7080 – exV2 < 2.0.4.3 - 'extract()' Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-7080
Directory traversal vulnerability in the avatar upload feature in exV2 2.0.4.3 and earlier allows remote attackers to delete arbitrary files via ".." sequences in the old_avatar parameter. Vulnerabilidad de escalado de directorio en la funcionalidad promocionar avatar en exV2 2.0.4.3 y versiones anteriores permite a atacantes remotos borrar ficheros de su elección mediante secuencias ".." en el parámetro old_avatar. • https://www.exploit-db.com/exploits/2415 http://www.securityfocus.com/bid/20161 https://exchange.xforce.ibmcloud.com/vulnerabilities/29130 •
CVE-2006-7079 – exV2 < 2.0.4.3 - 'extract()' Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-7079
Variable extraction vulnerability in include/common.php in exV2 2.0.4.3 and earlier allows remote attackers to overwrite arbitrary program variables and conduct directory traversal attacks to execute arbitrary code by modifying the $xoopsOption['pagetype'] variable. Vulnerabilidad de extracción de variable en include/common.php de exV2 2.0.4.3 y anteriores permite a atacantes remotos sobrescribir variables de programa de su elección y llevar a cabo ataques de salto de directorio para ejecutar código de su elección modificando la variable $xoopsOption['pagetype']. • https://www.exploit-db.com/exploits/2415 http://www.securityfocus.com/bid/20161 https://exchange.xforce.ibmcloud.com/vulnerabilities/29116 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-913: Improper Control of Dynamically-Managed Code Resources •