CVE-2005-2690 – PostNuke 0.75/0.76 DL - 'viewdownload.php' SQL Injection
https://notcve.org/view.php?id=CVE-2005-2690
SQL injection vulnerability in the Downloads module in PostNuke 0.760-RC4b allows PostNuke administrators to execute arbitrary SQL commands via the show parameter to dl-viewdownload.php. • https://www.exploit-db.com/exploits/26189 http://www.securityfocus.com/archive/1/408818 http://www.securityfocus.com/bid/14636 •
CVE-2005-2689 – PostNuke 0.76 RC4b - 'user.php?htmltext' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2005-2689
Multiple cross-site scripting (XSS) vulnerabilities in PostNuke 0.760-RC4b allows remote attackers to inject arbitrary web script or HTML via (1) the moderate parameter to the Comments module or (2) htmltext parameter to html/user.php. • https://www.exploit-db.com/exploits/26188 https://www.exploit-db.com/exploits/26187 http://www.securityfocus.com/archive/1/408818 http://www.securityfocus.com/bid/14635 •
CVE-2005-1777 – PostNuke 0.750 - 'readpmsg.php' SQL Injection
https://notcve.org/view.php?id=CVE-2005-1777
SQL injection vulnerability in readpmsg.php in PostNuke 0.750 allows remote attackers to execute arbitrary SQL commands via the start parameter. • https://www.exploit-db.com/exploits/1030 http://marc.info/?l=bugtraq&m=111721364707520&w=2 http://news.postnuke.com/Article2691.html http://securitytracker.com/id?1014066 •
CVE-2005-1778
https://notcve.org/view.php?id=CVE-2005-1778
Cross-site scripting (XSS) vulnerability in readpmsg.php in PostNuke 0.750 allows remote attackers to inject arbitrary web script or HTML via the start parameter. • http://marc.info/?l=bugtraq&m=111721364707520&w=2 http://news.postnuke.com/Article2691.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2005-1695
https://notcve.org/view.php?id=CVE-2005-1695
Multiple cross-site scripting (XSS) vulnerabilities in the RSS module in PostNuke 0.750 and 0.760RC2 and RC3 allow remote attackers to inject arbitrary web script or HTML via the (1) rss_url parameter to magpie_slashbox.php, or the url parameter to (2) magpie_simple.php or (3) magpie_debug.php. • http://marc.info/?l=bugtraq&m=111670482500552&w=2 http://marc.info/?l=bugtraq&m=111670506926649&w=2 http://news.postnuke.com/modules.php?op=modload&name=News&file=article&sid=2691 •