Page 8 of 55 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

phpBB 2.0.17 and earlier, when the register_long_arrays directive is disabled, allows remote attackers to modify global variables and bypass security mechanisms because PHP does not define the associated HTTP_* variables. • http://marc.info/?l=bugtraq&m=113081113317600&w=2 http://secunia.com/advisories/17366 http://secunia.com/advisories/18098 http://securityreason.com/securityalert/130 http://securitytracker.com/id?1015121 http://www.debian.org/security/2005/dsa-925 http://www.hardened-php.net/advisory_172005.75.html http://www.osvdb.org/20414 http://www.securityfocus.com/bid/15243 •

CVSS: 7.5EPSS: 6%CPEs: 24EXPL: 1

The bbencode_second_pass and make_clickable functions in bbcode.php for phpBB before 2.0.15, as used in viewtopic.php, privmsg.php, and other scripts, allow remote attackers to execute arbitrary script via a BBcode tag with a (1) javascript:, (2) applet:, (3) about:, (4) activex:, (5) chrome:, or (6) script: URI scheme, as demonstrated using the URL tag. • https://www.exploit-db.com/exploits/25628 http://castlecops.com/t123194-.html http://marc.info/?l=full-disclosure&m=111552510000088&w=2 http://seclists.org/lists/bugtraq/2005/May/0098.html http://secunia.com/advisories/15298 http://securitytracker.com/id?1013918 http://securitytracker.com/id?1014117 http://www.kb.cert.org/vuls/id/113196 http://www.osvdb.org/16439 http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=288194 http://www.securityfocus.com/bid/13545&# •

CVSS: 7.5EPSS: 1%CPEs: 24EXPL: 0

Meilad File upload script (up.php) mod for phpBB 2.0.x does not properly limit the types of files that can be uploaded, which allows remote authenticated users to execute arbitrary commands by uploading PHP files, then directly requesting them from the uploads directory. • http://marc.info/?l=bugtraq&m=111299353030534&w=2 http://securitytracker.com/id?1013671 http://www.defacers.com.mx/advisories/2.txt •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 2

phpBB 2.0.13 and earlier allows remote attackers to obtain sensitive information via a direct request to oracle.php, which reveals the path in a PHP error message. • http://marc.info/?l=bugtraq&m=110996579900134&w=2 http://neosecurityteam.net/Advisories/Advisory-09.txt http://neosecurityteam.tk/index.php?pagina=advisories&id=9 http://securitytracker.com/id?1013377 •

CVSS: 7.5EPSS: 4%CPEs: 29EXPL: 3

sessions.php in phpBB 2.0.12 and earlier allows remote attackers to gain administrator privileges via the autologinid value in a cookie. • https://www.exploit-db.com/exploits/897 https://www.exploit-db.com/exploits/871 https://www.exploit-db.com/exploits/889 http://marc.info/?l=bugtraq&m=110970201920206&w=2 http://marc.info/?l=bugtraq&m=110999268130739&w=2 http://secunia.com/advisories/14413 http://www.phpbb.com/phpBB/viewtopic.php?t=267563 •