Page 5 of 26 results (0.008 seconds)

CVSS: 5.0EPSS: 2%CPEs: 14EXPL: 3

sql_layer.php in PHP-Nuke 5.4 and earlier does not restrict access to debugging features, which allows remote attackers to gain SQL query information by setting the sql_debug parameter to (1) index.php and (2) modules.php. • https://www.exploit-db.com/exploits/21233 http://www.securityfaq.com/unixfocus/5OP041P6BE.html http://www.securityfocus.com/bid/3906 •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 2

index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname. • https://www.exploit-db.com/exploits/21349 http://online.securityfocus.com/archive/1/263337 http://www.iss.net/security_center/static/8618.php http://www.securityfocus.com/bid/4333 •

CVSS: 7.5EPSS: 4%CPEs: 13EXPL: 1

index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. index.php en Francisco Burzi PHP-Nuke 5.3.1 y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario especificando una URL al código malicioso en el parámetro fichero ('file'). • https://www.exploit-db.com/exploits/21230 http://marc.info/?l=bugtraq&m=101121913914205&w=2 http://www.kb.cert.org/vuls/id/221683 http://www.securityfocus.com/bid/3889 https://exchange.xforce.ibmcloud.com/vulnerabilities/7914 •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 2

Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php. • https://www.exploit-db.com/exploits/21166 https://www.exploit-db.com/exploits/21165 http://online.securityfocus.com/archive/1/245691 http://online.securityfocus.com/archive/1/245875 http://online.securityfocus.com/archive/82/243545 http://online.securityfocus.com/archive/82/246603 http://prdownloads.sourceforge.net/phpnuke/PHP-Nuke-5.5.tar.gz http://www.iss.net/security_center/static/7654.php http://www.securityfocus.com/bid/3609 •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

admin.php in PHP-Nuke 5.2 and earlier, except 5.0RC1, does not check login credentials for upload operations, which allows remote attackers to copy and upload arbitrary files and read the PHP-Nuke configuration file by directly calling admin.php with an upload parameter and specifying the file to copy. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0203.html http://sourceforge.net/forum/forum.php?forum_id=113892 http://www.securityfocus.com/bid/3361 https://exchange.xforce.ibmcloud.com/vulnerabilities/7170 •