CVE-2008-5813
https://notcve.org/view.php?id=CVE-2008-5813
SQL injection vulnerability in inc/rubriques.php in SPIP 1.8 before 1.8.3b, 1.9 before 1.9.2g, and 2.0 before 2.0.2 allows remote attackers to execute arbitrary SQL commands via the ID parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección SQL en inc/rubriques.php en SPIP v1.8 anteriores a v1.8.3b, v1.9 anteriores a v1.9.2g, y v2.0 anteriores a v2.0.2 permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro "ID". NOTA: algunos de los detalles han sido obtenidos a partir de la información de terceros. • http://secunia.com/advisories/33307 http://www.securityfocus.com/bid/33021 http://www.securityfocus.com/bid/33061 http://www.spip-contrib.net/SPIP-1-8-3b-1-9-2g-2-2 https://exchange.xforce.ibmcloud.com/vulnerabilities/47626 https://exchange.xforce.ibmcloud.com/vulnerabilities/47695 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2007-4525
https://notcve.org/view.php?id=CVE-2007-4525
PHP remote file inclusion vulnerability in inc-calcul.php3 in SPIP 1.7.2 allows remote attackers to execute arbitrary PHP code via a URL in the squelette_cache parameter, a different vector than CVE-2006-1702. NOTE: this issue has been disputed by third party researchers, stating that the squelette_cache variable is initialized before use, and is only used within the scope of a function ** EN DISPUTA ** Vulnerabilidad de inclusión remota de archivo en PHP en inc-calcul.php3 de SPIP versión 1.7.2 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro squelette_cache parameter, vector distinto de CVE-2006-1702. NOTA: esta característica ha sido cuestionada por investigadores de terceros, que indica que la variable squelette_cache es inicializada antes de su uso, y sólo se utiliza en el ámbito de una función. • http://securityreason.com/securityalert/3056 http://www.securityfocus.com/archive/1/477423/100/0/threaded http://www.securityfocus.com/archive/1/477728/100/0/threaded http://www.securityfocus.com/bid/25416 https://exchange.xforce.ibmcloud.com/vulnerabilities/36218 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-1702 – SPIP 1.8.3 - 'Spip_login.php' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-1702
PHP remote file inclusion vulnerability in spip_login.php3 in SPIP 1.8.3 allows remote attackers to execute arbitrary PHP code via a URL in the url parameter. • https://www.exploit-db.com/exploits/27589 http://www.securityfocus.com/archive/1/430443/100/0/threaded http://www.securityfocus.com/bid/17423 https://exchange.xforce.ibmcloud.com/vulnerabilities/25711 •
CVE-2006-1295
https://notcve.org/view.php?id=CVE-2006-1295
Cross-site scripting (XSS) vulnerability in recherche.php3 in SPIP 1.8.2-g allows remote attackers to inject arbitrary web script or HTML via the recherche parameter. • http://www.securityfocus.com/bid/17130 http://www.silitix.com/spip-xss.html http://www.zone-h.fr/advisories/read/id=1105 http://zone.spip.org/trac/spip-zone/changeset/1672 https://exchange.xforce.ibmcloud.com/vulnerabilities/25389 •
CVE-2006-0625 – SPIP 1.8.2 - 'Spip_RSS.php' Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-0625
Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3. • https://www.exploit-db.com/exploits/27172 http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html http://secunia.com/advisories/18676 http://securitytracker.com/id?1015602 http://www.osvdb.org/23086 http://www.securityfocus.com/bid/16556 http://www.vupen.com/english/advisories/2006/0483 https://exchange.xforce.ibmcloud.com/vulnerabilities/24600 •