Page 7 of 64 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an "e" modifier into a preg_replace statement. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20391 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005/2250 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20413 http://www.securityfocus.com/bid/15243 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier allows remote attackers to bypass protection mechanisms that deregister global variables by setting both a GET/POST/COOKIE (GPC) variable and a GLOBALS[] variable with the same name, which causes phpBB to unset the GLOBALS[] variable but not the GPC variable. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20386 http://www.securityfocus.com/bid/15243 https://exchange.xforce.ibmcloud.com/vulnerabilities/22914 •

CVSS: 4.3EPSS: 0%CPEs: 27EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.17 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) error_msg parameter to usercp_register.php, (2) forward_page parameter to login.php, and (3) list_cat parameter to search.php, which are not initialized as variables. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20387 http://www.osvdb.org/20388 http://www.osvdb.org/20389 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when the register_long_arrays directive is disabled, allows remote attackers to modify global variables and bypass security mechanisms because PHP does not define the associated HTTP_* variables. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20414 http://www.securityfocus.com/bid/15243 •