Page 3 of 16 results (0.003 seconds)

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in index.php in Maian Weblog 3.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, since the path_to_folder variable is initialized before use ** IMPUGNADA ** Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Maian Weblog 3.1 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro path_to_folder. NOTA: este asunto ha sido impugnado por un investigador de una tercera parte, ya que el la variable path_to_folder es inicializada antes de ser usada. • http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html http://attrition.org/pipermail/vim/2007-April/001527.html http://osvdb.org/35360 http://securityreason.com/securityalert/2582 http://www.securityfocus.com/archive/1/465735/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33708 •

CVSS: 6.8EPSS: 2%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in index.php in Maian Gallery 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, but confirmed by the vendor, stating "this problem existed only briefly in v1.0." Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Maian Gallery 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro path_to_folder. NOTA: este asunto fue impugnado por un investigador de una tercera parte, pero confirmado por el vendedor, estableciendo que "este problema existió sólo brevemente en v1.0". • http://archives.neohapsis.com/archives/bugtraq/2007-04/0244.html http://attrition.org/pipermail/vim/2007-April/001530.html http://www.osvdb.org/34149 http://www.securityfocus.com/archive/1/465732/100/0/threaded http://www.securityfocus.com/archive/1/465853/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/33692 •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in classes/class_mail.inc.php in Maian Recipe 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. Vulnerabilidad PHP de inclusión remota de archivo en classes/class_mail.inc.php en Maian Recipe 1.0 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro path_to_folder. • https://www.exploit-db.com/exploits/3284 http://osvdb.org/33125 http://osvdb.org/33689 http://secunia.com/advisories/24074 http://www.attrition.org/pipermail/vim/2007-February/001299.html http://www.vupen.com/english/advisories/2007/0537 https://exchange.xforce.ibmcloud.com/vulnerabilities/32346 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

SQL injection vulnerability in events.php in Maian Events 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters. Maian Events version 1.0 suffers from a SQL injection flaw. • http://evuln.com/vulns/102/description.html http://secunia.com/advisories/19274 http://securityreason.com/securityalert/646 http://www.osvdb.org/23947 http://www.securityfocus.com/archive/1/429093/100/0/threaded http://www.vupen.com/english/advisories/2006/0993 https://exchange.xforce.ibmcloud.com/vulnerabilities/25298 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

Multiple SQL injection vulnerabilities in Maian Weblog 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) entry and (2) email parameters to (a) print.php and (b) mail.php. • https://www.exploit-db.com/exploits/27478 https://www.exploit-db.com/exploits/27477 http://evuln.com/vulns/101/summary.html http://secunia.com/advisories/19273 http://securityreason.com/securityalert/638 http://securitytracker.com/id?1015818 http://www.osvdb.org/23945 http://www.osvdb.org/23946 http://www.securityfocus.com/archive/1/428903/100/0/threaded http://www.securityfocus.com/bid/17159 http://www.securityfocus.com/bid/17247 http://www.vupen.com/english •