Page 7 of 57 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

SQL injection vulnerability in phpBB 2 before 2.0.18 allows remote attackers to execute arbitrary SQL commands via the topic type. • http://secunia.com/advisories/18098 http://www.debian.org/security/2005/dsa-925 http://www.osvdb.org/22270 http://www.securityfocus.com/bid/15246 •

CVSS: 5.0EPSS: 0%CPEs: 27EXPL: 0

A "missing request validation" error in phpBB 2 before 2.0.18 allows remote attackers to edit private messages of other users, probably by modifying certain parameters or other inputs. • http://secunia.com/advisories/18098 http://www.debian.org/security/2005/dsa-925 http://www.securityfocus.com/bid/15246 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

SQL injection vulnerability in usercp_register.php in phpBB 2.0.17 allows remote attackers to execute arbitrary SQL commands via the signature_bbcode_uid parameter, which is not properly initialized. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20390 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005/2250 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an "e" modifier into a preg_replace statement. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20391 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005/2250 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20413 http://www.securityfocus.com/bid/15243 •