Page 7 of 38 results (0.002 seconds)

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 4

Multiple cross-site scripting (XSS) vulnerabilities in PostNuke 0.726 allows remote attackers to inject arbitrary web script or HTML via the (1) lid and query parameters to the Downloads module, (2) query parameter to the Web_links module, or (3) hlpfile parameter to openwindow.php. • https://www.exploit-db.com/exploits/22997 https://www.exploit-db.com/exploits/24037 http://marc.info/?l=bugtraq&m=108258902000472&w=2 http://www.securityfocus.com/bid/10191 http://www.waraxe.us/index.php?modname=sa&id=22 https://exchange.xforce.ibmcloud.com/vulnerabilities/15934 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in PostNuke 0.723 and earlier allows remote attackers to include arbitrary files named theme.php via the theme parameter to index.php. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0117.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 2.6EPSS: 1%CPEs: 7EXPL: 1

Cross-site scripting (XSS) vulnerability in PostNuke 0.71 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) name parameter in modules.php and (2) catid parameter in index.php. • http://archives.neohapsis.com/archives/bugtraq/2002-03/0288.html http://archives.neohapsis.com/archives/bugtraq/2002-03/0299.html http://sourceforge.net/tracker/index.php?func=detail&aid=524777&group_id=27927&atid=392228 http://www.iss.net/security_center/static/8605.php http://www.securityfocus.com/bid/4350 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

PHP file inclusion vulnerability in user.php in PostNuke 0.703 allows remote attackers to include arbitrary files and possibly execute code via the caselist parameter. • https://www.exploit-db.com/exploits/21357 http://archives.neohapsis.com/archives/bugtraq/2002-03/0345.html http://www.iss.net/security_center/static/8699.php http://www.securityfocus.com/bid/4381 •

CVSS: 5.0EPSS: 4%CPEs: 6EXPL: 4

Cross-site scripting vulnerabilities in PostBoard 2.0.1 and earlier allows remote attackers to execute script as other users via (1) an [IMG] tag when BBCode is enabled, or (2) in a topic title. • https://www.exploit-db.com/exploits/21401 https://www.exploit-db.com/exploits/21403 http://online.securityfocus.com/archive/1/267936 http://www.iss.net/security_center/static/8881.php http://www.securityfocus.com/bid/4559 http://www.securityfocus.com/bid/4561 https://exchange.xforce.ibmcloud.com/vulnerabilities/8884 •