Page 3 of 18 results (0.003 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 2

Directory traversal vulnerability in data/modules/blog/module_pages_site.php in Pluck 4.6.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the post parameter. Vulnerabilidad de salto de directorio en data/modules/blog/module_pages_site.php en Pluck v4.6.1 permite a los atacantes remotos incluir e ejecutar arbitrariamente archivos locales a traves de ..(punto punto) el el parámetro post. • https://www.exploit-db.com/exploits/8271 http://secunia.com/advisories/34415 http://www.securityfocus.com/bid/34207 https://exchange.xforce.ibmcloud.com/vulnerabilities/49378 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 2

Multiple directory traversal vulnerabilities in pluck 4.6.2, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the langpref parameter to (1) data/modules/contactform/module_info.php, (2) data/modules/blog/module_info.php, and (3) data/modules/albums/module_info.php, different vectors than CVE-2008-3194. Múltiples vulnerabilidades de salto de directorio en pluck v4.6.2, permite a atacantes remotos crear y ejecutar archivos de su elección a través de un .. (punto punto) en el parámtro langpref sobre (1) data/modules/contactform/module_info.php, (2) data/modules/blog/module_info.php, y (3) data/modules/albums/module_info.php, es un vector distinto a CVE-2008-3194. • https://www.exploit-db.com/exploits/8715 http://secunia.com/advisories/35145 http://www.securityfocus.com/bid/35007 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 2

Directory traversal vulnerability in data/inc/lib/pcltar.lib.php in Pluck 4.5.3, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the g_pcltar_lib_dir parameter. Vulnerabilidad de salto de directorio en data/inc/lib/pcltar.lib.php in Pluck v4.5.3, cuando register_globals está activado, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de secuencias de salto de directorio en el parámetro "g_pcltar_lib_dir". • https://www.exploit-db.com/exploits/7153 http://secunia.com/advisories/32736 http://www.pluck-cms.org/index.php?file=kop11.php http://www.securityfocus.com/archive/1/498438 http://www.securityfocus.com/bid/32342 https://exchange.xforce.ibmcloud.com/vulnerabilities/46676 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a ..\ (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.php; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.php. NOTE: the issue involving vectors 1 through 3 reportedly exists because of an incomplete fix for CVE-2008-3194. Múltiples vulnerabilidades de salto de directorio en Pluck CMS 4.5.2 en Windows permite a atacantes remotos incluir y ejecutar archivos locales de su elección mediante ..\ (punto punto barra invertida) en los parámetros (1) blogpost, (2) cat y (3) file a data/inc/themes/predefined_variables.php, como se llega a él mediante index.php; y lso parámetros (4) blogpost Y (5) cat a data/inc/blog_include_react.php, del modo que se llega a ellos mediante index.php. • https://www.exploit-db.com/exploits/6300 http://secunia.com/advisories/31607 http://securityreason.com/securityalert/4195 http://www.pluck-cms.org/releasenotes.php#4.5.3 http://www.securityfocus.com/archive/1/495706/100/0/threaded http://www.securityfocus.com/bid/30820 https://exchange.xforce.ibmcloud.com/vulnerabilities/44677 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Pluck 4.5.2, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) lang_footer parameter to (a) data/inc/footer.php; the (2) pluck_version, (3) lang_install22, (4) titelkop, (5) lang_kop1, (6) lang_kop2, (7) lang_modules, (8) lang_kop4, (9) lang_kop15, (10) lang_kop5, and (11) titelkop parameters to (b) data/inc/header.php; the pluck_version and titelkop parameters to (c) data/inc/header2.php; and the (14) lang_theme6 parameter to (d) data/inc/themeinstall.php. Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS)en Pluck 4.5.2, cuando register_globals es activado, permite a los atacantes remotos inyectar una secuencia de comandos web o HTML arbitrarios a través del (1) parámetro lang_footer en (a) data/inc/footer.php; los parámetros (2) pluck_version, (3) lang_install22, (4) titelkop, (5) lang_kop1, (6) lang_kop2, (7) lang_modules, (8) lang_kop4, (9) lang_kop15, (10) lang_kop5, y (11) titelkop en (b) data/inc/header.php; los parámetros pluck_version y titelkop en (c) data/inc/header2.php; y el parámetro (14) lang_theme6 en (d) data/inc/themeinstall.php. • https://www.exploit-db.com/exploits/32168 http://securityreason.com/securityalert/4125 http://www.securityfocus.com/archive/1/495110/100/0/threaded http://www.securityfocus.com/bid/30542 https://exchange.xforce.ibmcloud.com/vulnerabilities/44237 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •