Page 3 of 15 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

Ultimate PHP Board (UPB) 1.9.6 GOLD uses weak encryption for passwords in the users.dat file, which allows attackers to easily decrypt the passwords and gain privileges, possibly after exploiting CVE-2005-2005 to obtain users.dat. • https://www.exploit-db.com/exploits/25838 http://marc.info/?l=bugtraq&m=111893777504821&w=2 http://www.securityfocus.com/bid/13975 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

viewforum.php in Ultimate PHP Board (UPB) 1.8 through 1.9.6 may allow remote attackers to read sensitive data via the postorder parameter, which is not properly handled by textdb.inc.php, possibly due to a SQL injection vulnerability. • https://www.exploit-db.com/exploits/25655 http://marc.info/?l=bugtraq&m=111600262424876&w=2 http://www.securityfocus.com/bid/13622 •

CVSS: 6.8EPSS: 1%CPEs: 4EXPL: 2

Cross-site scripting (XSS) vulnerability in viewforum.php in Ultimate PHP Board (UPB) 1.8 through 1.9.6 allows remote attackers to inject arbitrary web script or HTML via the postorder parameter. • https://www.exploit-db.com/exploits/25654 http://marc.info/?l=bugtraq&m=111600262424876&w=2 http://www.securityfocus.com/bid/13621 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

viewforum.php in Ultimate PHP Board (UPB) 1.8 through 1.9.6 allows remote attackers to obtain sensitive information via an invalid (1) id or possibly (2) postorder parameter, which reveals the path in an error message when a file can not be opened. • http://marc.info/?l=bugtraq&m=111600262424876&w=2 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Ultimate PHP Board (UPB) 1.9 allows remote attackers to execute arbitrary PHP code with UPB administrator privileges via an HTTP request containing the code in the User-Agent header, which is executed when the administrator executes admin_iplog.php. Ultimate PHP Board (UPB) 1.9 permite a atacantes remotos ejecutar código PHP arbitrario con privilegios de administrador UPB mediante una petición HTTP conteniendo el código en la cabecera User-Agent, que es ejecutado cuando el administrador ejecuta admin_iplog.php. • https://www.exploit-db.com/exploits/22642 http://f0kp.iplus.ru/bz/024.en.txt http://marc.info/?l=bugtraq&m=105379741528925&w=2 • CWE-94: Improper Control of Generation of Code ('Code Injection') •