Page 5 of 42 results (0.003 seconds)

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 1

PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parameter ending in %00. NOTE: this issue was originally disputed by the vendor, but the dispute was withdrawn on 20060926. admin/admin_board.php en PunBB 1.2.12 no maneja adecuadamente los nombres de ruta de un avatar que finalizen en %00, lo cual permite a un usuario remoto administrador validado el envío de ficheros de su elección y ejecutar código, como lo demostrado lanzado una sentencia al admin_options.php con el parámetro avatars_dir acabado en %00. NOTA: Esta vulnerabilidad fue originalmente impugnada por el proveedor, pero la impugnación fue retraída el 20060926. • http://forums.punbb.org/viewtopic.php?id=13255 http://www.attrition.org/pipermail/vim/2006-September/001041.html http://www.attrition.org/pipermail/vim/2006-September/001052.html http://www.attrition.org/pipermail/vim/2006-September/001055.html http://www.security.nnov.ru/Odocument221.html http://www.securityfocus.com/archive/1/445788/100/0/threaded http://www.securityfocus.com/archive/1/446420/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/28884 •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in PunBB 1.2.11 allows remote authenticated administrators to inject arbitrary HTML or web script to other administrators via the "Admin note" feature, a different vulnerability than CVE-2006-2227. • http://seclists.org/lists/bugtraq/2006/May/0408.html http://securitytracker.com/id?1016157 http://www.neosecurityteam.net/advisories/Advisory-22.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/26616 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in misc.php in PunBB 1.2.11 allows remote attackers to inject arbitrary web script or HTML via the req_message parameter, because the value of the redirect_url parameter is not sanitized. • http://secunia.com/advisories/19986 http://securityreason.com/securityalert/849 http://www.osvdb.org/25256 http://www.punbb.org/changelogs/1.2.11_to_1.2.12.txt http://www.punbb.org/download/hdiff/hdiff-1.2.11_to_1.2.12.html http://www.securityfocus.com/archive/1/432950/100/0/threaded http://www.securityfocus.com/bid/17827 http://www.vupen.com/english/advisories/2006/1670 https://exchange.xforce.ibmcloud.com/vulnerabilities/26245 •

CVSS: 4.3EPSS: 0%CPEs: 26EXPL: 0

Cross-site scripting (XSS) vulnerability in header.php in PunBB 1.2.10 allows remote attackers to inject arbitrary web script or HTML via the URL, which is not properly handled when the PHP_SELF variable is used to handle a pun_page tag. • http://secunia.com/advisories/19039 http://www.punbb.org/changelogs/1.2.10_to_1.2.11.txt http://www.punbb.org/download/patch/punbb-1.2.10_to_1.2.11.patch http://www.securityfocus.com/bid/16891 http://www.vupen.com/english/advisories/2006/0773 https://exchange.xforce.ibmcloud.com/vulnerabilities/24982 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 1

register.php in PunBB 1.2.10 allows remote attackers to cause an unspecified denial of service via a flood of new user registrations. • https://www.exploit-db.com/exploits/1517 http://www.punbb.org/changelogs/1.2.10_to_1.2.11.txt http://www.punbb.org/download/patch/punbb-1.2.10_to_1.2.11.patch http://www.vupen.com/english/advisories/2006/0773 https://exchange.xforce.ibmcloud.com/vulnerabilities/24837 •