Page 6 of 46 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

PostNuke 0.750 and 0.760RC3 allows remote attackers to obtain sensitive information via a direct request to (1) theme.php or (2) Xanthia.php in the Xanthia module, (3) user.php, (4) thelang.php, (5) text.php, (6) html.php, (7) menu.php, (8) finclude.php, or (9) button.php in the pnblocks directory in the Blocks module, (10) config.php in the NS-Multisites (aka Multisites) module, or (11) xmlrpc.php, which reveals the path in an error message. • http://marc.info/?l=bugtraq&m=111670506926649&w=2 • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

The RSS module in PostNuke 0.750 and 0.760RC2 and RC3 allows remote attackers to obtain sensitive information via a direct request to simple_smarty.php, which reveals the path in an error message. • http://marc.info/?l=bugtraq&m=111670482500552&w=2 • CWE-425: Direct Request ('Forced Browsing') •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Directory traversal vulnerability in the pnModFunc function in pnMod.php for PostNuke 0.750 through 0.760rc4 allows remote attackers to read arbitrary files via a .. (dot dot) in the func parameter to index.php. • http://cvs.postnuke.com/viewcvs.cgi/Historic_PostNuke_Library/postnuke-devel/html/includes/pnMod.php.diff?r1=1.47&r2=1.48 http://marc.info/?l=bugtraq&m=111627124301526&w=2 http://news.postnuke.com/Article2690.html http://news.postnuke.com/modules.php?op=modload&name=News&file=article&sid=2691 http://www.vupen.com/english/advisories/2005/0553 •

CVSS: 2.6EPSS: 2%CPEs: 1EXPL: 5

Multiple cross-site scripting vulnerabilities in PostNuke 0.760-RC3 allow remote attackers to inject arbitrary web script or HTML via the (1) module parameter to admin.php or (2) op parameter to user.php. NOTE: the vendor reports that certain issues could not be reproduced for 760 RC3, or for .750. However, the op/user.php issue exists when the pnAntiCracker setting is disabled. • https://www.exploit-db.com/exploits/25367 https://www.exploit-db.com/exploits/25366 http://cvs.postnuke.com/viewcvs.cgi/Historic_PostNuke_Library/postnuke-devel/html/user.php.diff?r1=1.18&r2=1.19 http://digitalparadox.org/advisories/postnuke.txt http://marc.info/?l=bugtraq&m=111298226029957&w=2 http://news.postnuke.com/modules.php?op=modload&name=News&file=article&sid=2679 http://secunia.com/advisories/14868 http://securitytracker.com/id?1013670 http://www.osvdb.org/15370& •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in modules.php in PostNuke 0.760 RC3 allows remote attackers to execute arbitrary SQL statements via the sid parameter. NOTE: the vendor reports that they could not reproduce the issues for 760 RC3, or for .750. • http://digitalparadox.org/advisories/postnuke.txt http://marc.info/?l=bugtraq&m=111298226029957&w=2 http://news.postnuke.com/modules.php?op=modload&name=News&file=article&sid=2679 http://secunia.com/advisories/14868 http://securitytracker.com/id?1013670 http://www.osvdb.org/15371 https://exchange.xforce.ibmcloud.com/vulnerabilities/20019 •