Page 5 of 30 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 2

phpBB 2.0.13 and earlier allows remote attackers to obtain sensitive information via a direct request to oracle.php, which reveals the path in a PHP error message. • http://marc.info/?l=bugtraq&m=110996579900134&w=2 http://neosecurityteam.net/Advisories/Advisory-09.txt http://neosecurityteam.tk/index.php?pagina=advisories&id=9 http://securitytracker.com/id?1013377 •

CVSS: 7.5EPSS: 4%CPEs: 29EXPL: 3

sessions.php in phpBB 2.0.12 and earlier allows remote attackers to gain administrator privileges via the autologinid value in a cookie. • https://www.exploit-db.com/exploits/897 https://www.exploit-db.com/exploits/871 https://www.exploit-db.com/exploits/889 http://marc.info/?l=bugtraq&m=110970201920206&w=2 http://marc.info/?l=bugtraq&m=110999268130739&w=2 http://secunia.com/advisories/14413 http://www.phpbb.com/phpBB/viewtopic.php?t=267563 •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 3

SQL injection vulnerability in search.php for phpBB 1.0 through 2.0.6 allows remote attackers to execute arbitrary SQL and gain privileges via the search_results parameter. • https://www.exploit-db.com/exploits/23821 http://www.securityfocus.com/archive/1/357442 http://www.securityfocus.com/bid/9883 https://exchange.xforce.ibmcloud.com/vulnerabilities/15475 •

CVSS: 7.5EPSS: 96%CPEs: 29EXPL: 4

viewtopic.php in phpBB 2.x before 2.0.11 improperly URL decodes the highlight parameter when extracting words and phrases to highlight, which allows remote attackers to execute arbitrary PHP code by double-encoding the highlight value so that special characters are inserted into the result, which is then processed by PHP exec, as exploited by the Santy.A worm. • https://www.exploit-db.com/exploits/12510 https://www.exploit-db.com/exploits/647 https://www.exploit-db.com/exploits/16890 https://www.exploit-db.com/exploits/24274 http://marc.info/?l=bugtraq&m=110029415208724&w=2 http://marc.info/?l=bugtraq&m=110365752909029&w=2 http://marc.info/?t=110079440800004&r=1&w=2 http://secunia.com/advisories/13239 http://www.kb.cert.org/vuls/id/497400 http://www.phpbb.com/phpBB/viewtopic.php?t=240513 http://www. •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in auth.php for PhpBB 1.4.0 through 1.4.4 allows remote attackers to read and include arbitrary files via .. (dot dot) sequences followed by NULL (%00) characters in CGI parameters, as demonstrated using the lang parameter in prefs.php. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0245.html http://www.securityfocus.com/bid/6889 https://exchange.xforce.ibmcloud.com/vulnerabilities/11407 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •