Page 4 of 93 results (0.004 seconds)

CVSS: 7.5EPSS: 11%CPEs: 1EXPL: 1

SQL injection vulnerability in charts.php in the Chart mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter. • https://www.exploit-db.com/exploits/27857 http://www.securityfocus.com/archive/1/433715/100/0/threaded http://www.securityfocus.com/archive/1/433848/100/0/threaded http://www.securityfocus.com/archive/1/434461/100/0/threaded http://www.securityfocus.com/bid/17952 https://exchange.xforce.ibmcloud.com/vulnerabilities/26415 •

CVSS: 4.3EPSS: 3%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in charts.php in the Chart mod for phpBB allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: this issue might be resultant from SQL injection. • https://www.exploit-db.com/exploits/27858 http://www.securityfocus.com/archive/1/433715/100/0/threaded http://www.securityfocus.com/archive/1/433848/100/0/threaded http://www.securityfocus.com/archive/1/434461/100/0/threaded http://www.securityfocus.com/bid/17952 https://exchange.xforce.ibmcloud.com/vulnerabilities/26414 •

CVSS: 6.8EPSS: 8%CPEs: 3EXPL: 1

PHP remote file inclusion vulnerability in auction\auction_common.php in Auction mod 1.3m for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. • https://www.exploit-db.com/exploits/1747 http://pridels0.blogspot.com/2006/05/phpbb-auction-mod-remote-file.html http://secunia.com/advisories/19944 http://www.osvdb.org/25263 http://www.securityfocus.com/bid/17822 http://www.vupen.com/english/advisories/2006/1641 https://exchange.xforce.ibmcloud.com/vulnerabilities/26192 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

phpBB 2.0.20 does not verify user-specified input variable types before being passed to type-dependent functions, which allows remote attackers to obtain sensitive information, as demonstrated by the (1) mode parameter to memberlist.php and the (2) highlight parameter to viewtopic.php that are used as an argument to the htmlspecialchars or urlencode functions, which displays the installation path in the resulting error message. phpBB 2.0.20 no verifica tipos de variables de entrada especificadas por el usuario antes de ser pasadas a funciones dependientes del tipo, lo cual permite a atacantes remotos obtener información sensible, como ha sido demostrado por (1) el parámetro mode a memberlist.php y el (2) parámetro highlight a viewtopic.php que son usados como argumento en las funciones htmlspecialchars o urlencode, lo cual muestra la ruta de instalación en el mensaje de error resultante. • http://marc.info/?l=bugtraq&m=114695651425026&w=2 http://marc.info/?l=bugtraq&m=114731067321710&w=2 http://marc.info/?l=full-disclosure&m=114685931319903&w=2 http://securityreason.com/securityalert/837 https://exchange.xforce.ibmcloud.com/vulnerabilities/26306 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in admin/addentry.php in phpBB Advanced Guestbook 2.4.0 and earlier, when register_globals is enabled, allows remote attackers to include arbitrary files via the phpbb_root_path parameter. • https://www.exploit-db.com/exploits/1723 http://secunia.com/advisories/19905 http://www.securityfocus.com/bid/17745 http://www.vupen.com/english/advisories/2006/1600 https://exchange.xforce.ibmcloud.com/vulnerabilities/26217 https://www.exploit-db.com/exploits/1725 •