Page 8 of 93 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

admin/admin_disallow.php in phpBB 2.0.18 allows remote attackers to obtain the installation path via a direct request with a non-empty setmodules parameter, which causes an invalid append_sid function call that leaks the path in an error message. • http://marc.info/?l=full-disclosure&m=113484567432679&w=2 http://secunia.com/advisories/18125 http://secunia.com/advisories/18252 http://securityreason.com/achievement_securityalert/29 http://securityreason.com/securityalert/269 http://www.osvdb.org/21804 http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=352966 http://www.securityfocus.com/archive/1/420537/100/0/threaded http://www.vupen.com/english/advisories/2005/2991 http://www.vupen.com/english/advisories/2006/0010 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

phpBB 2.0.18 allows remote attackers to obtain sensitive information via a large SQL query, which generates an error message that reveals SQL syntax or the full installation path. phpBB 2.0.18 permite a atacantes remotos obtener información sensible mediante una consulta SQL grande, lo que genera un mensaje de error que revela la sintaxis SQL de la ruta de instalación completa. • http://marc.info/?l=bugtraq&m=113200740718682&w=2 http://marc.info/?l=bugtraq&m=113210133012767&w=2 http://securityreason.com/achievement_exploitalert/4 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

SQL injection vulnerability in usercp_register.php in phpBB 2.0.17 allows remote attackers to execute arbitrary SQL commands via the signature_bbcode_uid parameter, which is not properly initialized. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20390 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005/2250 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an "e" modifier into a preg_replace statement. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20391 http://www.securityfocus.com/bid/15243 http://www.vupen.com/english/advisories/2005/2250 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20413 http://www.securityfocus.com/bid/15243 •