CVE-2002-2032 – PHP-Nuke 4.x/5.x - SQL_Debug Information Disclosure
https://notcve.org/view.php?id=CVE-2002-2032
sql_layer.php in PHP-Nuke 5.4 and earlier does not restrict access to debugging features, which allows remote attackers to gain SQL query information by setting the sql_debug parameter to (1) index.php and (2) modules.php. • https://www.exploit-db.com/exploits/21233 http://www.securityfaq.com/unixfocus/5OP041P6BE.html http://www.securityfocus.com/bid/3906 •
CVE-2002-0483 – PHP-Nuke 5.x - Error Message Web Root Disclosure
https://notcve.org/view.php?id=CVE-2002-0483
index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname. • https://www.exploit-db.com/exploits/21349 http://online.securityfocus.com/archive/1/263337 http://www.iss.net/security_center/static/8618.php http://www.securityfocus.com/bid/4333 •
CVE-2002-0206 – PHP-Nuke 4.x/5.x - Arbitrary File Inclusion
https://notcve.org/view.php?id=CVE-2002-0206
index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. index.php en Francisco Burzi PHP-Nuke 5.3.1 y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario especificando una URL al código malicioso en el parámetro fichero ('file'). • https://www.exploit-db.com/exploits/21230 http://marc.info/?l=bugtraq&m=101121913914205&w=2 http://www.kb.cert.org/vuls/id/221683 http://www.securityfocus.com/bid/3889 https://exchange.xforce.ibmcloud.com/vulnerabilities/7914 •
CVE-2001-1524 – PHP-Nuke 1.0/2.5/3.0/4.x/5.x/6.x/7.x - 'modules.php' Multiple Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2001-1524
Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php. • https://www.exploit-db.com/exploits/21166 https://www.exploit-db.com/exploits/21165 http://online.securityfocus.com/archive/1/245691 http://online.securityfocus.com/archive/1/245875 http://online.securityfocus.com/archive/82/243545 http://online.securityfocus.com/archive/82/246603 http://prdownloads.sourceforge.net/phpnuke/PHP-Nuke-5.5.tar.gz http://www.iss.net/security_center/static/7654.php http://www.securityfocus.com/bid/3609 •
CVE-2001-0854
https://notcve.org/view.php?id=CVE-2001-0854
PHP-Nuke 5.2 allows remote attackers to copy and delete arbitrary files by calling case.filemanager.php with admin.php as an argument, which sets the $PHP_SELF variable and makes it appear that case.filemanager.php is being called by admin.php instead of the user. • http://marc.info/?l=bugtraq&m=100525739116093&w=2 http://www.iss.net/security_center/static/7478.php http://www.securityfocus.com/bid/3510 •