4 results (0.003 seconds)

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in pm/language/spanish/preferences.php in PMachine Pro 2.4.1 allows remote attackers to inject arbitrary web script or HTML via the L_PREF_NAME[855] parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en pm/language/spanish/preferences.php de PMachine Pro 2.4.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro L_PREF_NAME[855]. • https://www.exploit-db.com/exploits/31027 http://packetstormsecurity.org/0801-exploits/pMachinePro-241-xss.txt http://www.securityfocus.com/bid/27282 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in core.input.php in ExpressionEngine 1.4.1 allows remote attackers to inject arbitrary web script or HTML via HTTP_REFERER (referer). • https://www.exploit-db.com/exploits/27127 http://evuln.com/vulns/48/summary.html http://secunia.com/advisories/18602 http://securityreason.com/securityalert/372 http://www.securityfocus.com/archive/1/423068/100/0/threaded http://www.securityfocus.com/bid/16377 http://www.vupen.com/english/advisories/2006/0325 https://exchange.xforce.ibmcloud.com/vulnerabilities/24296 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in mail_autocheck.php in the Email This Entry add-on for pMachine Pro 2.4, and possibly other versions including pMachine Free, allows remote attackers to execute arbitrary PHP code by directly requesting mail_autocheck.php and modifying the pm_path parameter to reference a URL on a remote web server that contains the code, a different vulnerability than CVE-2003-1086. • https://www.exploit-db.com/exploits/25127 http://marc.info/?l=full-disclosure&m=110883604531802&w=2 http://www.securityfocus.com/bid/12597 http://www.securityfocus.com/bid/15473 •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

PHP remote file inclusion vulnerability in pm/lib.inc.php in pMachine Free and pMachine Pro 2.2 and 2.2.1 allows remote attackers to execute arbitrary PHP code by modifying the pm_path parameter to reference a URL on a remote web server that contains the code. • https://www.exploit-db.com/exploits/22776 http://marc.info/?l=bugtraq&m=105638414205498&w=2 http://www.pmachine.com/forum/threads.php?id=7274_0_13_0_C •