Page 4 of 39 results (0.001 seconds)

CVSS: 2.1EPSS: 0%CPEs: 29EXPL: 0

Multiple SQL injection vulnerabilities in PunBB before 1.2.14 allow remote authenticated administrators to execute arbitrary SQL commands via unspecified vectors. Múltiples vulnerabilidades de inyección SQL en PunBB anetrior a 1.2.14 permiten a adminstradores autenticados remotamente ejecutar comandos SQL de su elección a través de vectores no especificados. • http://forums.punbb.org/viewtopic.php?id=13496 http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Directory traversal vulnerability in include/common.php in PunBB before 1.2.14 allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the language parameter, related to register.php storing a language value in the users table. Vulnerabilidad de escalado de directorio en include/common.php en PunBB anterior a 1.2.14 permite a usuarios autenticados remotamente incluir y ejecutar archivos locales de su elección mediante un .. (punto punto) en el parámetro language, relacionado con que register.php almacena un valor de idioma en la tabla de usuarios. • http://secunia.com/advisories/22622 http://securityreason.com/securityalert/1824 http://securitytracker.com/id?1017131 http://www.osvdb.org/30132 http://www.punbb.org/changelogs/1.2.13_to_1.2.14.txt http://www.securityfocus.com/archive/1/450055/100/0/threaded http://www.vupen.com/english/advisories/2006/4256 http://www.wargan.org/index.php/2006/10/29/4-punbb-1213-multiple-vulnerabilities •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 1

PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parameter ending in %00. NOTE: this issue was originally disputed by the vendor, but the dispute was withdrawn on 20060926. admin/admin_board.php en PunBB 1.2.12 no maneja adecuadamente los nombres de ruta de un avatar que finalizen en %00, lo cual permite a un usuario remoto administrador validado el envío de ficheros de su elección y ejecutar código, como lo demostrado lanzado una sentencia al admin_options.php con el parámetro avatars_dir acabado en %00. NOTA: Esta vulnerabilidad fue originalmente impugnada por el proveedor, pero la impugnación fue retraída el 20060926. • http://forums.punbb.org/viewtopic.php?id=13255 http://www.attrition.org/pipermail/vim/2006-September/001041.html http://www.attrition.org/pipermail/vim/2006-September/001052.html http://www.attrition.org/pipermail/vim/2006-September/001055.html http://www.security.nnov.ru/Odocument221.html http://www.securityfocus.com/archive/1/445788/100/0/threaded http://www.securityfocus.com/archive/1/446420/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/28884 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in PunBB 1.2.11 allows remote authenticated administrators to inject arbitrary HTML or web script to other administrators via the "Admin note" feature, a different vulnerability than CVE-2006-2227. • http://seclists.org/lists/bugtraq/2006/May/0408.html http://securitytracker.com/id?1016157 http://www.neosecurityteam.net/advisories/Advisory-22.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/26616 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in misc.php in PunBB 1.2.11 allows remote attackers to inject arbitrary web script or HTML via the req_message parameter, because the value of the redirect_url parameter is not sanitized. • http://secunia.com/advisories/19986 http://securityreason.com/securityalert/849 http://www.osvdb.org/25256 http://www.punbb.org/changelogs/1.2.11_to_1.2.12.txt http://www.punbb.org/download/hdiff/hdiff-1.2.11_to_1.2.12.html http://www.securityfocus.com/archive/1/432950/100/0/threaded http://www.securityfocus.com/bid/17827 http://www.vupen.com/english/advisories/2006/1670 https://exchange.xforce.ibmcloud.com/vulnerabilities/26245 •