Page 4 of 17 results (0.006 seconds)

CVSS: 5.4EPSS: 1%CPEs: 4EXPL: 3

src/index.php in WebSPELL 4.01.01 and earlier, when register_globals is enabled, allows remote attackers to bypass authentication and gain sensitive information stored in the database via a modified userID parameter in a write action to admin/database.php. src/index.php en WebSPELL 4.01.01 y anteriores, cuando register_globals está habilitado, permite a atacantes remotos evitar la autenticación y obtener información sensible almacenada en la base de datos, mediante un parámetro userID modificado en una operación de escritura en admin/database.php. • https://www.exploit-db.com/exploits/2352 http://cms.webspell.org/index.php?site=files&file=15 http://secunia.com/advisories/21881 http://www.securityfocus.com/bid/19975 http://www.vupen.com/english/advisories/2006/3572 https://exchange.xforce.ibmcloud.com/vulnerabilities/28896 •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 1

SQL injection vulnerability in search.php in webSPELL 4.01.00 and earlier allows remote attackers to inject arbitrary SQL commands via the title_op parameter. • https://www.exploit-db.com/exploits/1498 http://secunia.com/advisories/18885 http://www.securityfocus.com/bid/16673 http://www.vupen.com/english/advisories/2006/0606 http://www.webspell.org/index.php?site=news_comments&newsID=49&lang=en https://exchange.xforce.ibmcloud.com/vulnerabilities/24708 •