Page 6 of 29 results (0.005 seconds)

CVSS: 7.5EPSS: 4%CPEs: 13EXPL: 1

index.php in Francisco Burzi PHP-Nuke 5.3.1 and earlier, and possibly other versions before 5.5, allows remote attackers to execute arbitrary PHP code by specifying a URL to the malicious code in the file parameter. index.php en Francisco Burzi PHP-Nuke 5.3.1 y versiones anteriores permite a atacantes remotos ejecutar código PHP arbitrario especificando una URL al código malicioso en el parámetro fichero ('file'). • https://www.exploit-db.com/exploits/21230 http://marc.info/?l=bugtraq&m=101121913914205&w=2 http://www.kb.cert.org/vuls/id/221683 http://www.securityfocus.com/bid/3889 https://exchange.xforce.ibmcloud.com/vulnerabilities/7914 •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

admin.php in PHP-Nuke 5.2 and earlier, except 5.0RC1, does not check login credentials for upload operations, which allows remote attackers to copy and upload arbitrary files and read the PHP-Nuke configuration file by directly calling admin.php with an upload parameter and specifying the file to copy. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0203.html http://sourceforge.net/forum/forum.php?forum_id=113892 http://www.securityfocus.com/bid/3361 https://exchange.xforce.ibmcloud.com/vulnerabilities/7170 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

banners.php in PHP-Nuke 4.4 and earlier allows remote attackers to modify banner ad URLs by directly calling the Change operation, which does not require authentication. • https://www.exploit-db.com/exploits/20729 http://archives.neohapsis.com/archives/bugtraq/2001-04/0017.html http://phpnuke.org/download.php?dcategory=Fixes http://www.securityfocus.com/bid/2544 https://exchange.xforce.ibmcloud.com/vulnerabilities/6342 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 3

admin.php3 in PHP-Nuke does not properly verify the PHP-Nuke administrator password, which allows remote attackers to gain privileges by requesting a URL that does not specify the aid or pwd parameter. • https://www.exploit-db.com/exploits/20158 http://archives.neohapsis.com/archives/bugtraq/2000-08/0243.html http://www.osvdb.org/1521 http://www.securityfocus.com/bid/1592 •