Page 5 of 25 results (0.002 seconds)

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

admin.php in PHP-Nuke 5.2 and earlier, except 5.0RC1, does not check login credentials for upload operations, which allows remote attackers to copy and upload arbitrary files and read the PHP-Nuke configuration file by directly calling admin.php with an upload parameter and specifying the file to copy. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0203.html http://sourceforge.net/forum/forum.php?forum_id=113892 http://www.securityfocus.com/bid/3361 https://exchange.xforce.ibmcloud.com/vulnerabilities/7170 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

banners.php in PHP-Nuke 4.4 and earlier allows remote attackers to modify banner ad URLs by directly calling the Change operation, which does not require authentication. • https://www.exploit-db.com/exploits/20729 http://archives.neohapsis.com/archives/bugtraq/2001-04/0017.html http://phpnuke.org/download.php?dcategory=Fixes http://www.securityfocus.com/bid/2544 https://exchange.xforce.ibmcloud.com/vulnerabilities/6342 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

cookiedecode function in PHP-Nuke 4.4 allows users to bypass authentication and gain access to other user accounts by extracting the authentication information from a cookie. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0257.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6183 •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

bb_smilies.php and bbcode_ref.php in PHP-Nuke 4.4 allows remote attackers to read arbitrary files and gain PHP administrator privileges by inserting a null character and .. (dot dot) sequences into a malformed username argument. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0425.html •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 3

admin.php3 in PHP-Nuke does not properly verify the PHP-Nuke administrator password, which allows remote attackers to gain privileges by requesting a URL that does not specify the aid or pwd parameter. • https://www.exploit-db.com/exploits/20158 http://archives.neohapsis.com/archives/bugtraq/2000-08/0243.html http://www.osvdb.org/1521 http://www.securityfocus.com/bid/1592 •