Page 6 of 97 results (0.015 seconds)

CVSS: 7.5EPSS: 94%CPEs: 7EXPL: 3

Multiple SQL injection vulnerabilities in the Search module in PHP-Nuke 7.8, and possibly other versions before 7.9 with patch 3.1, allows remote attackers to execute arbitrary SQL commands, as demonstrated via the query parameter in a stories type. Múltiples vulnerabilidades de inyección de SQL en el módulo de Busqueda de PHP-Nuke 7.8, y posiblemente otras versiones anteriores a 7.9 con el parche 3.1, permite a atacantes remotos ejecutar comandos SQL arbitrarios, como se ha demostrado mediante el parámetro "query" en un tipo 'stories'. • https://www.exploit-db.com/exploits/1326 http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0454.html http://marc.info/?l=bugtraq&m=113210758511323&w=2 http://secunia.com/advisories/17543 http://securityreason.com/achievement_exploitalert/5 http://securitytracker.com/id?1015215 http://securitytracker.com/id?1015651 http://www.osvdb.org/20866 http://www.securityfocus.com/archive/1/425508/100/0/threaded http://www.securityfocus.com/archive/1/425627/100/0/threaded http& •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

Multiple SQL injection vulnerabilities in PHP-Nuke 7.8 allow remote attackers to modify SQL queries and execute arbitrary PHP code via (1) the username parameter in the Your Account page, (2) the url parameter in the Downloads module, and (3) the description parameter in the Web_Links module. • https://www.exploit-db.com/exploits/32747 http://marc.info/?l=bugtraq&m=113017049702436&w=2 http://rgod.altervista.org/phpnuke78sql.html http://secunia.com/advisories/17315 http://www.osvdb.org/20291 http://www.osvdb.org/20292 http://www.osvdb.org/20293 http://www.securityfocus.com/bid/15178 http://www.vupen.com/english/advisories/2005/2191 https://exchange.xforce.ibmcloud.com/vulnerabilities/22851 •

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

Multiple unspecified vulnerabilities in the WYSIWYG editor in PHP-Nuke before 7.9 Final have unknown impact and attack vectors. • http://secunia.com/advisories/16843 http://www.phpnuke.org/modules.php?name=News&file=article&sid=7435 •

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 0

PHP-Nuke 7.6 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) ipban.php, (2) db.php, (3) lang-norwegian.php, (4) lang-indonesian.php, (5) lang-greek.php, (6) a request to Web_Links with the portuguese language (lang-portuguese.php), (7) a request to Web_Links with the indonesian language (lang-indonesian.php), (8) a request to the survey module with the indonesian language (lang-indonesian.php), (9) a request to the Reviews module with the portuguese language, or (10) a request to the Journal module with the portuguese language, which reveal the path in an error message. • http://marc.info/?l=bugtraq&m=111478982629035&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

HTTP Response Splitting vulnerability in the Surveys module in PHP-Nuke 7.6 allows remote attackers to spoof web content and poison web caches via hex-encoded CRLF ("%0d%0a") sequences in the forwarder parameter. • http://marc.info/?l=bugtraq&m=111359804013536&w=2 http://secunia.com/advisories/14965 http://www.digitalparadox.org/advisories/pnuke.txt http://www.osvdb.org/15647 https://exchange.xforce.ibmcloud.com/vulnerabilities/20116 •