7 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in index.php in Plohni Shoutbox 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) input_name and (2) input_text parameters. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en index.php en Plohni Shoutbox v1.0 permiten a atacantes remotos inyectar HTML o scripts web a través de los parámetros (1) input_name y (2) input_text. NOTA: algunos de estos detalles han sido obtenidos de información de terceros. • https://www.exploit-db.com/exploits/10168 http://osvdb.org/60310 http://secunia.com/advisories/37418 http://www.exploit-db.com/exploits/10168 https://exchange.xforce.ibmcloud.com/vulnerabilities/54321 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in the Shoutbox module for Drupal 5.x before Shoutbox 5.x-1.1 allows remote authenticated users to inject arbitrary web script or HTML via Shoutbox block messages. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo Shoutbox para Drupal 5.x versiones anteriores a Shoutbox 5.x-1.1 permite a usuarios remotos autenticados inyectar scripts web o HTML de su elección mediante mensajes de bloque Shoutbox. • http://drupal.org/node/198163 http://osvdb.org/39053 http://secunia.com/advisories/27953 http://www.securityfocus.com/bid/26736 https://exchange.xforce.ibmcloud.com/vulnerabilities/38885 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 11%CPEs: 1EXPL: 2

PHP remote file inclusion vulnerability in shoutbox.php in Shoutbox 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the root parameter. Vulnerabilidad de inclusión remota de archivo en PHP en shoutbox.php de Shoutbox 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro root. • https://www.exploit-db.com/exploits/30479 http://osvdb.org/36622 http://secunia.com/advisories/26396 http://securityreason.com/securityalert/2997 http://www.securityfocus.com/archive/1/475960/100/0/threaded http://www.securityfocus.com/bid/25254 http://www.vupen.com/english/advisories/2007/2835 https://exchange.xforce.ibmcloud.com/vulnerabilities/35921 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Toxiclab Shoutbox 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for db.mdb. Toxiclab Shoutbox 1 almacena información sensible bajo la raíz web con control de acceso insuficiente, lo cual permite a atacantes remotos descargar una base de datos que contiene contraseñas mediante una petición directa de db.mdb. • http://osvdb.org/33576 http://securityreason.com/securityalert/2213 http://www.securityfocus.com/archive/1/457931/100/0/threaded •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in shout.php in Knusperleicht ShoutBox 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) sbNick or (2) sbKommentar parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en shout.php de Knusperleicht ShoutBox 2.6 permiten a un atacante remoto inyectar secuencias de comandos web o HTML mediante los parámetros (1) sbNick o (2) sbKommentar. • https://www.exploit-db.com/exploits/29294 http://secunia.com/advisories/23526 http://www.securityfocus.com/bid/21637 http://www.securityfocus.com/data/vulnerabilities/exploits/21637.html •