Page 31 of 179 results (0.005 seconds)

CVSS: 7.5EPSS: 96%CPEs: 29EXPL: 4

viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm. • https://www.exploit-db.com/exploits/12510 https://www.exploit-db.com/exploits/647 https://www.exploit-db.com/exploits/16890 https://www.exploit-db.com/exploits/24274 http://marc.info/?l=bugtraq&m=110029415208724&w=2 http://marc.info/?l=bugtraq&m=110365752909029&w=2 http://marc.info/?t=110079440800004&r=1&w=2 http://secunia.com/advisories/13239 http://www.kb.cert.org/vuls/id/497400 http://www.phpbb.com/phpBB/viewtopic.php?t=240513 http://www. •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in PhpBB 2.0.8 allow remote attackers to inject arbitrary web script or HTML via (1) the cat_title parameter in index.php, (2) the faq[0][0] parameter in lang_faq.php as accessible from faq.php, or (3) the faq[0][0] parameter in lang_bbcode.php as accessible from faq.php. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en phpBB 2.0.8 permite a atacantes remotos inyectar scritp web o HTML de su elección mediante (1) el parámetro cat_title en index.php (2) el parámetro faq[0][0] en lang_faq.php, cuando se accede desde faq.php, o (3) el parámetro faq[0][0] en lang_bbcode cuando se accede desde faq.php. • http://marc.info/?l=bugtraq&m=108999024506020&w=2 http://www.securityfocus.com/bid/10738 http://www.waraxe.us/index.php?modname=sa&id=34 https://exchange.xforce.ibmcloud.com/vulnerabilities/16724 https://exchange.xforce.ibmcloud.com/vulnerabilities/16725 https://exchange.xforce.ibmcloud.com/vulnerabilities/16726 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

PhpBB 2.0.8 allows remote attackers to gain sensitive information via an invalid (1) category_rows parameter to index.php, (2) faq parameter to faq.php, or (3) ranksrow parameter to profile.php, which reveal the full path in an error message. phpBB 2.0.8 permiteaatacantes remotos obtener información sensible mediante parámetros inválidos: (1) category_rows a index.php, (2) faq a faq.php, o (3) ranksrow a profile.php, lo que revela la ruta completa en el mensaje de error. • http://marc.info/?l=bugtraq&m=108999024506020&w=2 http://www.waraxe.us/index.php?modname=sa&id=34 https://exchange.xforce.ibmcloud.com/vulnerabilities/16716 https://exchange.xforce.ibmcloud.com/vulnerabilities/16720 https://exchange.xforce.ibmcloud.com/vulnerabilities/16723 •

CVSS: 4.3EPSS: 0%CPEs: 19EXPL: 1

Cross-site scripting (XSS) vulnerability in search.php for PhpBB 2.0.4 and 2.0.9 allows remote attackers to inject arbitrary HTMl or web script via the search_author parameter. • http://marc.info/?l=bugtraq&m=109034476122723&w=2 http://secunia.com/advisories/12114 http://www.securityfocus.com/bid/10753 https://exchange.xforce.ibmcloud.com/vulnerabilities/16758 •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 1

phpBB 2.0.8a and earlier trusts the IP address that is in the X-Forwarded-For in the HTTP header, which allows remote attackers to spoof IP addresses. • http://marc.info/?l=bugtraq&m=108239864203144&w=2 http://marc.info/?l=bugtraq&m=108241122908409&w=2 http://secunia.com/advisories/11434 http://www.securityfocus.com/bid/10170 https://exchange.xforce.ibmcloud.com/vulnerabilities/15909 •