Page 5 of 98 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 15EXPL: 3

31 Dec 2004 — Multiple cross-site scripting (XSS) vulnerabilities in Php-Nuke 6.x through 7.3 allow remote attackers to inject arbitrary HTML or web script into the (1) optionbox parameter in the News module, (2) date parameter in the Statistics module, (3) year, month, and month_1 parameters in the Stories_Archive module, (4) mode, order, and thold parameters in the Surveys module, or (5) a SQL statement to index.php, as processed by mainfile.php. • http://marc.info/?l=bugtraq&m=108482957715299&w=2 •

CVSS: 6.1EPSS: 0%CPEs: 15EXPL: 6

31 Dec 2004 — Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter. NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-10... • https://www.exploit-db.com/exploits/24191 •

CVSS: 6.1EPSS: 0%CPEs: 15EXPL: 4

31 Dec 2004 — Canonicalize-before-filter error in the send_review function in the Reviews module for PHP-Nuke 6.0 to 7.3 allows remote attackers to inject arbitrary web script or HTML via hex-encoded XSS sequences in the text parameter, which is checked for dangerous sequences before it is canonicalized, leading to a cross-site scripting (XSS) vulnerability. • https://www.exploit-db.com/exploits/24194 •

CVSS: 9.8EPSS: 0%CPEs: 15EXPL: 4

31 Dec 2004 — SQL injection vulnerability in the Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to execute arbitrary SQL commands via the order parameter. • https://www.exploit-db.com/exploits/24192 •

CVSS: 5.3EPSS: 0%CPEs: 15EXPL: 3

31 Dec 2004 — The preview_review function in the Reviews module in PHP-Nuke 6.0 to 7.3, when running on Windows systems, allows remote attackers to obtain sensitive information via an invalid date parameter, which generates an error message. • http://secunia.com/advisories/11852 •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 4

31 Dec 2004 — The Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to cause a denial of service (CPU and memory consumption) via a large, out-of-range score parameter. • https://www.exploit-db.com/exploits/24193 •

CVSS: 6.8EPSS: 0%CPEs: 10EXPL: 1

31 Dec 2004 — SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered. • http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

23 Jul 2004 — SQL injection vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to execute arbitrary SQL statements via the instory parameter. Vulnerabilidad de inyección de SQL en index.php del módúlo de búsqueda de Php-Nuke permite a atacantes remotos ejecuatar código SQL de su elección mediante el parámetro "instory" • http://marc.info/?l=bugtraq&m=109002107329823&w=2 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

23 Jul 2004 — Cross-site scripting (XSS) vulnerability in index.php in the Search module for Php-Nuke allows remote attackers to inject arbitrary script as other users via the input field. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php del módulo de búsqueda de Php-Nuke permite a atacantes remotos inyectar script de su elección como otros usuarios mediante el campo entrada. • http://marc.info/?l=bugtraq&m=109002107329823&w=2 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

23 Jul 2004 — The search module in Php-Nuke allows remote attackers to gain sensitive information via the (1) "**" or (2) "+" search patterns, which reveals the path in an error message. El módulo de búsqueda en Php-Nuke permite a atacantes remotos obtener información sensible mediante patrones de búsqueda (1) "**" o "+", que revelan la ruta en el mensaje de error. • http://marc.info/?l=bugtraq&m=109026609504767&w=2 •