5 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

PEEL, possibly 3.x and earlier, allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function. PEEL, posiblemente 3.x y versiones anteriores, permite a atacantes remotos obtener información de configuración mediante una petición directa a phpinfo.php, que realiza una llamada a la función phpinfo. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 https://exchange.xforce.ibmcloud.com/vulnerabilities/41494 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 2

PEEL, possibly 3.x and earlier, has (1) a default info@peel.fr account with password admin, and (2) a default contact@peel.fr account with password cinema, which allows remote attackers to gain administrative access. PEEL, posiblemente 3.x y versiones anteriores, tiene (1) una cuenta por defecto info@peel.fr con contraseña admin y (2) una cuenta por defecto contact@peel.fr con contraseña cinema, que permite a atacantes remotos conseguir acceso administrativo. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 https://exchange.xforce.ibmcloud.com/vulnerabilities/41493 • CWE-16: Configuration •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 3

Unrestricted file upload vulnerability in administrer/produits.php in PEEL, possibly 3.x and earlier, allows remote authenticated administrators to upload and execute arbitrary PHP files via a modified content type in an ajout action, as demonstrated by (1) image/gif and (2) application/pdf. Vulnerabilidad de subida de ficheros no restringidos en administrer/produits.php de PEEL, posiblemente versión 3.x y anteriores, permite a administradores remotos autenticados subir y ejecutar archivos PHP de su elección mediante un tipo de contenido modificado en una acción ajout, tal y como se ha demostrado con (1) image/gif y (2) application/pdf. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 http://secunia.com/advisories/29466 http://www.securityfocus.com/bid/28346 https://exchange.xforce.ibmcloud.com/vulnerabilities/41354 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 3

Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php. Múltiples vulnerabilidades de Inyección SQL en PEEL, posiblemente versión 3.x y anteriores, permite a atacantes remotos ejecutar comandos SQL de su elección mediante el (1) parámetro email en (a) membre.php y el (2) parámetro timestamp en (b) la acción details en achat/historique_commandes.php y (c) la acción facture en factures/facture_html.php. • https://www.exploit-db.com/exploits/5281 http://realn.free.fr/releases/70207 http://secunia.com/advisories/29466 http://www.securityfocus.com/bid/28346 https://exchange.xforce.ibmcloud.com/vulnerabilities/41341 https://exchange.xforce.ibmcloud.com/vulnerabilities/41353 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

SQL injection vulnerability in index.php in Peel 2.6 through 2.7 allows remote attackers to execute arbitrary SQL commands via the rubid parameter. • http://secunia.com/advisories/17536 http://www.osvdb.org/20818 http://www.securityfocus.com/bid/15415 http://www.vupen.com/english/advisories/2005/2416 •