Page 7 of 40 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

SQL injection vulnerability in inc/rubriques.php in SPIP 1.8 before 1.8.3b, 1.9 before 1.9.2g, and 2.0 before 2.0.2 allows remote attackers to execute arbitrary SQL commands via the ID parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección SQL en inc/rubriques.php en SPIP v1.8 anteriores a v1.8.3b, v1.9 anteriores a v1.9.2g, y v2.0 anteriores a v2.0.2 permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro "ID". NOTA: algunos de los detalles han sido obtenidos a partir de la información de terceros. • http://secunia.com/advisories/33307 http://www.securityfocus.com/bid/33021 http://www.securityfocus.com/bid/33061 http://www.spip-contrib.net/SPIP-1-8-3b-1-9-2g-2-2 https://exchange.xforce.ibmcloud.com/vulnerabilities/47626 https://exchange.xforce.ibmcloud.com/vulnerabilities/47695 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

PHP remote file inclusion vulnerability in inc-calcul.php3 in SPIP 1.7.2 allows remote attackers to execute arbitrary PHP code via a URL in the squelette_cache parameter, a different vector than CVE-2006-1702. NOTE: this issue has been disputed by third party researchers, stating that the squelette_cache variable is initialized before use, and is only used within the scope of a function ** EN DISPUTA ** Vulnerabilidad de inclusión remota de archivo en PHP en inc-calcul.php3 de SPIP versión 1.7.2 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro squelette_cache parameter, vector distinto de CVE-2006-1702. NOTA: esta característica ha sido cuestionada por investigadores de terceros, que indica que la variable squelette_cache es inicializada antes de su uso, y sólo se utiliza en el ámbito de una función. • http://securityreason.com/securityalert/3056 http://www.securityfocus.com/archive/1/477423/100/0/threaded http://www.securityfocus.com/archive/1/477728/100/0/threaded http://www.securityfocus.com/bid/25416 https://exchange.xforce.ibmcloud.com/vulnerabilities/36218 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in spip_login.php3 in SPIP 1.8.3 allows remote attackers to execute arbitrary PHP code via a URL in the url parameter. • https://www.exploit-db.com/exploits/27589 http://www.securityfocus.com/archive/1/430443/100/0/threaded http://www.securityfocus.com/bid/17423 https://exchange.xforce.ibmcloud.com/vulnerabilities/25711 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in recherche.php3 in SPIP 1.8.2-g allows remote attackers to inject arbitrary web script or HTML via the recherche parameter. • http://www.securityfocus.com/bid/17130 http://www.silitix.com/spip-xss.html http://www.zone-h.fr/advisories/read/id=1105 http://zone.spip.org/trac/spip-zone/changeset/1672 https://exchange.xforce.ibmcloud.com/vulnerabilities/25389 •

CVSS: 6.4EPSS: 3%CPEs: 3EXPL: 3

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3. • https://www.exploit-db.com/exploits/27172 http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html http://secunia.com/advisories/18676 http://securitytracker.com/id?1015602 http://www.osvdb.org/23086 http://www.securityfocus.com/bid/16556 http://www.vupen.com/english/advisories/2006/0483 https://exchange.xforce.ibmcloud.com/vulnerabilities/24600 •