Page 7 of 46 results (0.001 seconds)

CVSS: 4.3EPSS: 4%CPEs: 15EXPL: 6

Multiple cross-site scripting (XSS) vulnerabilities in PHP-Nuke 6.0 to 7.3 allow remote attackers to inject arbitrary web script or HTML via the (1) eid parameter or (2) query parameter to the Encyclopedia module, (3) preview_review function in the Reviews module as demonstrated by the url, cover, rlanguage, and hits parameters, or (4) savecomment function in the Reviews module, as demonstrated using the uname parameter. NOTE: the Faq/categories and Encyclopedia/ltr issues are already covered by CVE-2005-1023. • https://www.exploit-db.com/exploits/24191 http://secunia.com/advisories/11852 http://www.osvdb.org/6997 http://www.osvdb.org/6998 http://www.osvdb.org/6999 http://www.securityfocus.com/archive/1/365865 http://www.securityfocus.com/bid/10524 https://exchange.xforce.ibmcloud.com/vulnerabilities/16406 •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 3

The preview_review function in the Reviews module in PHP-Nuke 6.0 to 7.3, when running on Windows systems, allows remote attackers to obtain sensitive information via an invalid date parameter, which generates an error message. • http://secunia.com/advisories/11852 http://www.osvdb.org/7001 http://www.securityfocus.com/archive/1/365865 http://www.securityfocus.com/bid/10524 https://exchange.xforce.ibmcloud.com/vulnerabilities/16408 •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 4

SQL injection vulnerability in the Reviews module in PHP-Nuke 6.0 to 7.3 allows remote attackers to execute arbitrary SQL commands via the order parameter. • https://www.exploit-db.com/exploits/24192 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0310.html http://secunia.com/advisories/11852 http://www.osvdb.org/7000 http://www.securityfocus.com/archive/1/365865 http://www.securityfocus.com/bid/10524 https://exchange.xforce.ibmcloud.com/vulnerabilities/16407 •

CVSS: 7.5EPSS: 8%CPEs: 15EXPL: 4

PHP remote file inclusion vulnerability in index.php in Php-Nuke 6.x through 7.3 allows remote attackers to execute arbitrary PHP code by modifying the modpath parameter to reference a URL on a remote web server that contains the code. • https://www.exploit-db.com/exploits/24127 http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html http://marc.info/?l=bugtraq&m=108482888621896&w=2 http://secunia.com/advisories/11625 http://www.osvdb.org/6222 http://www.securityfocus.com/bid/10365 http://www.waraxe.us/index.php?modname=sa&id=29 https://exchange.xforce.ibmcloud.com/vulnerabilities/16218 •

CVSS: 7.5EPSS: 37%CPEs: 28EXPL: 2

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string. • https://www.exploit-db.com/exploits/24166 http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html http://marc.info/?l=bugtraq&m=108611606320559&w=2 http://marc.info/?l=bugtraq&m=108611643614881&w=2 http://marc.info/?l=bugtraq&m=108662955105757&w=2 http://secunia.com/advisories/11766 http://www.osvdb.org/6593 http://www.securityfocus.com/bid/10447 https://exchange.xforce.ibmcloud.com/vulnerabi •