Page 3 of 105 results (0.001 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors. La función message_options en includes/ucp/ucp_pm_options.php en phpBB anterior a 3.0.13 no valida correctamente la clave del formulario, lo que permite a atacantes remotos realizar ataques de CSRF y cambiar la configuración de ficheros completos a través de vectores no especificados. • http://seclists.org/oss-sec/2015/q1/373 http://www.securityfocus.com/bid/72399 https://exchange.xforce.ibmcloud.com/vulnerabilities/100671 https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449 https://github.com/phpbb/phpbb/pull/3311 https://security.gentoo.org/glsa/201701-25 https://tracker.phpbb.com/browse/PHPBB3-13526 https://wiki.phpbb.com/Release_Highlights/3.0.13 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum. feed.php en phpBB v3.0.7 anterior a v3.0.7-PL1 no comprueba correctamente los permisos para feeds, lo que permite a usuarios remotos saltarse las restricciones de acceso a través de vectores de ataque no especificados, relacionados con las configuraciones de permisos en un foro privado. • http://www.openwall.com/lists/oss-security/2010/05/16/1 http://www.openwall.com/lists/oss-security/2010/05/18/6 http://www.phpbb.com/community/viewtopic.php?f=14&t=2014195 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a "forum id" in circumstances related to a "global announcement." Vulnerabilidad no especificada en posting.php de phpBB anterior a v3.0.5 tiene un impacto y vectores de ataque desconocidos relacionados con el uso de un "forum id" en circunstancias relacionadas con un "global announcement". • http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657 http://www.openwall.com/lists/oss-security/2010/05/16/1 http://www.openwall.com/lists/oss-security/2010/05/18/12 http://www.openwall.com/lists/oss-security/2010/05/19/5 http://www.phpbb.com/community/viewtopic.php?f=14&p=9764445 •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 5

SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php. Vulnerabilidad de inyección SQL en root/includes/prime_quick_style.php en el complemento Prime Quick Style anterior a v1.2.3 para phpBB v3 permite a usuarios autenticados remotamente ejecutar comandos SQL de su elección a través del parámetro prime_quick_style en ucp.php. • https://www.exploit-db.com/exploits/9569 http://secunia.com/advisories/36532 http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml http://www.exploit-db.com/exploits/9569 http://www.phpbb.com/community/viewtopic.php?f=70&t=692625&start=150#p10649315 http://www.securityfocus.com/bid/36214 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header. phpBB v2.0.23 incluye la el ID de sesión en una petición a modcp.php cuando el moderador o administrador cierra un hilo, lo que permite a atacantes remotos secuestrar la sesión a través de un envío en el hilo conteniendo una URL a una imagen hospedada remotamente, que permite incluir el ID de sesión en la cabercera Referer. • http://osvdb.org/51121 http://www.securityfocus.com/archive/1/489815/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •