Page 9 of 56 results (0.007 seconds)

CVSS: 7.5EPSS: 37%CPEs: 28EXPL: 2

PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string. • https://www.exploit-db.com/exploits/24166 http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html http://marc.info/?l=bugtraq&m=108611606320559&w=2 http://marc.info/?l=bugtraq&m=108611643614881&w=2 http://marc.info/?l=bugtraq&m=108662955105757&w=2 http://secunia.com/advisories/11766 http://www.osvdb.org/6593 http://www.securityfocus.com/bid/10447 https://exchange.xforce.ibmcloud.com/vulnerabi •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 2

Cross-site scripting (XSS) vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to inject arbitrary HTML and web script via the (1) ttitle or (2) sid parameters to modules.php. • http://marc.info/?l=bugtraq&m=108378804809891&w=2 http://secunia.com/advisories/11553 http://www.waraxe.us/index.php?modname=sa&id=27 https://exchange.xforce.ibmcloud.com/vulnerabilities/16073 •

CVSS: 5.0EPSS: 0%CPEs: 9EXPL: 1

The Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to gain sensitive information via an invalid show parameter to modules.php, which reveals the full path in a PHP error message. • http://marc.info/?l=bugtraq&m=108378804809891&w=2 http://www.waraxe.us/index.php?modname=sa&id=27 •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 2

SQL injection vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL via the (1) orderby or (2) sid parameters to modules.php. • https://www.exploit-db.com/exploits/31283 http://marc.info/?l=bugtraq&m=108378804809891&w=2 http://osvdb.org/52223 http://secunia.com/advisories/11553 http://www.securityfocus.com/archive/1/488452/100/0/threaded http://www.securityfocus.com/bid/10282 http://www.securityfocus.com/bid/27932 http://www.waraxe.us/index.php?modname=sa&id=27 https://exchange.xforce.ibmcloud.com/vulnerabilities/16074 •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 2

Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message. • http://marc.info/?l=bugtraq&m=108360247732014&w=2 http://secunia.com/advisories/11524 http://securitytracker.com/id?1010001 http://www.osvdb.org/5756 http://www.osvdb.org/6495 http://www.osvdb.org/6496 http://www.osvdb.org/6497 http://www.osvdb.org/6498 http://www.osvdb.org/6499 http://www.osvdb.org/6500 http://www.waraxe.us/index.php?modname=sa&id=26 https://exchange.xforce.ibmcloud.com/vulnerabilities/16039 •