Page 3 of 17 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in PostNuke 0.723 and earlier allows remote attackers to include arbitrary files named theme.php via the theme parameter to index.php. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0117.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.6EPSS: 1%CPEs: 7EXPL: 1

Cross-site scripting (XSS) vulnerability in PostNuke 0.71 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) name parameter in modules.php and (2) catid parameter in index.php. • http://archives.neohapsis.com/archives/bugtraq/2002-03/0288.html http://archives.neohapsis.com/archives/bugtraq/2002-03/0299.html http://sourceforge.net/tracker/index.php?func=detail&aid=524777&group_id=27927&atid=392228 http://www.iss.net/security_center/static/8605.php http://www.securityfocus.com/bid/4350 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

PHP file inclusion vulnerability in user.php in PostNuke 0.703 allows remote attackers to include arbitrary files and possibly execute code via the caselist parameter. • https://www.exploit-db.com/exploits/21357 http://archives.neohapsis.com/archives/bugtraq/2002-03/0345.html http://www.iss.net/security_center/static/8699.php http://www.securityfocus.com/bid/4381 •

CVSS: 5.0EPSS: 4%CPEs: 6EXPL: 4

Cross-site scripting vulnerabilities in PostBoard 2.0.1 and earlier allows remote attackers to execute script as other users via (1) an [IMG] tag when BBCode is enabled, or (2) in a topic title. • https://www.exploit-db.com/exploits/21401 https://www.exploit-db.com/exploits/21403 http://online.securityfocus.com/archive/1/267936 http://www.iss.net/security_center/static/8881.php http://www.securityfocus.com/bid/4559 http://www.securityfocus.com/bid/4561 https://exchange.xforce.ibmcloud.com/vulnerabilities/8884 •

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 0

Cross-site scripting (XSS) vulnerability in user.php in PostNuke 0.64 allows remote attackers to inject arbitrary web script or HTML via the uname parameter. • http://online.securityfocus.com/archive/1/245691 http://online.securityfocus.com/archive/82/243545 http://www.iss.net/security_center/static/7654.php http://www.securityfocus.com/bid/3609 •