Page 8 of 42 results (0.004 seconds)

CVSS: 6.8EPSS: 6%CPEs: 1EXPL: 3

Cross-site scripting (XSS) vulnerability in the MyHeadlines before 4.3.2 module for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via the myh_op parameter to modules.php. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo MyHeadlines anterior a 4.3.2 para PHP-Nuke permite a un atacante remoto inyectar secuencias de comandos web o HTML de su elección a trave´s del parámetro myh_op en module.php. • https://www.exploit-db.com/exploits/28487 http://secunia.com/advisories/21653 http://www.jmagar.com/index.php?y=0&myh=user&myh_op=showLink&myh_link=8 http://www.osvdb.org/28463 http://www.securityfocus.com/bid/19825 http://www.vupen.com/english/advisories/2006/3436 https://exchange.xforce.ibmcloud.com/vulnerabilities/28718 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

PHP remote file inclusion vulnerability in includes/functions_common.php in the VWar Account module (vWar_Account) in PHPNuke Clan 3.0.1 allows remote attackers to include arbitrary files via a URL in the vwar_root2 parameter. NOTE: it is possible that this issue stems from a problem in VWar itself, but this is not clear. Vulnerabilidad de inclusión de fichero PHP remoto en includes/funcions_common.php en el módulo VWar Account (vWar_Account) en PHPNuke Clan 3.0.1 permite a atacantes remotos incluir ficheros de su elección mediante una URL en el parámetro vwar_root2. NOTA: es posible que esta cuestión provenga de un problema en el mismo VWar, pero no está claro. • http://secunia.com/advisories/19501 http://www.osvdb.org/24481 http://www.securityfocus.com/archive/1/429615/100/0/threaded http://www.securityfocus.com/bid/17356 http://www.vupen.com/english/advisories/2006/1202 https://exchange.xforce.ibmcloud.com/vulnerabilities/25609 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

PHP-Nuke 6.x through 7.6 allows remote attackers to obtain sensitive information via a direct request to (1) index.php with the forum_admin parameter set, (2) the Surveys module, or (3) the Your_Account module, which reveals the path in a PHP error message. PHP-Nuke 6.x hasta la versión 7.6 permite a atacantes remotos obtener información sensible a través de una petición directa a (1) index.php con el parámetro forum_admin establecido, (2) el módulo Surveys o (3) el módulo Your_Account, lo que revela la ruta en un mensaje de error PHP. • http://marc.info/?l=bugtraq&m=111272010303144&w=2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

Cross-site request forgery (CSRF) vulnerability in Php-Nuke 6.x through 7.1.0 allows remote attackers to gain administrative privileges via an img tag with a URL to admin.php. • https://www.exploit-db.com/exploits/23835 http://marc.info/?l=bugtraq&m=108006309112075&w=2 http://secunia.com/advisories/11195 http://www.securityfocus.com/bid/9895 https://exchange.xforce.ibmcloud.com/vulnerabilities/15596 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 4%CPEs: 2EXPL: 1

Absolute path traversal vulnerability in nukestyles.com viewpage.php addon for PHP-Nuke allows remote attackers to read arbitrary files via a full pathname in the file parameter. NOTE: This was originally reported as an issue in PHP-Nuke 6.5, but this is an independent addon. • https://www.exploit-db.com/exploits/22422 http://www.securityfocus.com/archive/1/316179/30/25340/threaded http://www.securityfocus.com/archive/1/316198/30/25340/threaded http://www.securityfocus.com/archive/1/316209/30/25340/threaded http://www.securityfocus.com/archive/1/316233/30/25340/threaded http://www.securityfocus.com/archive/1/316327/30/25340/threaded http://www.securityfocus.com/archive/1/316341/30/25310/threaded http://www.securityfocus.com/archive/1/316585/30/25 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •