5 results (0.002 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in template/purpletech/base_include.php in DigitalHive (aka hive) 2.0 RC2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter. Vulnerabilidad de salto de directorio en template/purpletech/base_include.php de DigitalHive (también conocido como hive) 2.0 RC2, permite a atacantes remotos añadir y ejecutar ficheros locales arbitrarios a traves de la secuencia .. (punto punto) en el parámetro "page". • https://www.exploit-db.com/exploits/31804 http://www.securityfocus.com/bid/29255 http://www.z0rlu.ownspace.org/index.php?/archives/85-hive-v2.0-RC2-LFi.html https://exchange.xforce.ibmcloud.com/vulnerabilities/42495 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

Multiple SQL injection vulnerabilities in Digital Hive 2.0 RC2 and earlier allow (1) remote attackers to execute arbitrary SQL commands via the selectskin parameter to an unspecified program, or (2) remote authenticated administrators to execute arbitrary SQL commands via the user_id parameter in the gestion_membre.php page to base.php. Múltiples vulnerabilidades de inyección SQL en Digital Hive 2.0 RC2 y anteriores permite (1) a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro selectskin en un programa especificado, o a(2) administradores remotos validados ejecutar comandos SQL de su elección a través del parámetro user_id en la página gestion_membre.php en base.php. • https://www.exploit-db.com/exploits/4887 http://www.securityfocus.com/bid/27232 https://exchange.xforce.ibmcloud.com/vulnerabilities/39602 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in template/purpletech/base_include.php in DigitalHive 2.0 RC2 allows remote attackers to execute arbitrary PHP code via a URL in the page parameter. Vulnerabilidad de inclusión remota del archivo en PHP template/purpletech/base_include.php en DigitalHive 2.0 RC2 permite a los atacantes remotos la ejecución de código PHP de su elección a través de una URL en el parámetro page. • https://www.exploit-db.com/exploits/2566 http://osvdb.org/31068 http://securityreason.com/securityalert/1770 http://securitytracker.com/id?1017095 http://www.securityfocus.com/archive/1/449214/100/0/threaded http://www.securityfocus.com/bid/20639 https://exchange.xforce.ibmcloud.com/vulnerabilities/29554 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

DigitalHive 2.0 allows remote attackers to re-install the product by directly accessing the install script. • http://securitytracker.com/id?1013516 https://exchange.xforce.ibmcloud.com/vulnerabilities/19802 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in base.php for DigitalHive 2.0 allow remote attackers to inject arbitrary web script or HTML via (1) the mt parameter to the membres.php page or (2) the -afs-1- query string to the msg.php page. • https://www.exploit-db.com/exploits/25264 https://www.exploit-db.com/exploits/25263 http://secunia.com/advisories/14702 http://securitytracker.com/id?1013516 http://www.securityfocus.com/bid/12883 https://exchange.xforce.ibmcloud.com/vulnerabilities/19803 •