2 results (0.029 seconds)

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 1

WSN Forum 1.3.4 and earlier allows remote attackers to execute arbitrary PHP code via a modified pathname in the pathtoconfig parameter that points to an avatar image that contains PHP code, which is then accessed from prestart.php. NOTE: this issue has been labeled remote file inclusion, but that label only applies to the attack, not the underlying vulnerability. WSN Forum 1.3.4 y anteriores permite a un atacante remoto ejecutar código PHP de su elección a través de una nombre de camino modificado en el parámetro pathtoconfig que apunta a una imagen avatar que contiene código PHP, lo cual se alcanza desde prestart.php. NOTA: este asunto ha sido etiquetado en la inclusión remota de archivo, pero la etiqueta solo se aplica al ataque, no a la vulnerabilidad subrayada. • https://www.exploit-db.com/exploits/2583 http://secunia.com/advisories/22360 http://www.securityfocus.com/bid/20586 http://www.vupen.com/english/advisories/2006/4081 https://exchange.xforce.ibmcloud.com/vulnerabilities/29635 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

SQL injection vulnerability in memberlist.php in WSN Forum 1.21 allows remote attackers to execute arbitrary SQL commands via the id parameter in a profile action. • https://www.exploit-db.com/exploits/26567 http://pridels0.blogspot.com/2005/11/wsn-forum-id-sql-injection.html http://secunia.com/advisories/17694 http://www.osvdb.org/21068 http://www.securityfocus.com/bid/15549 http://www.vupen.com/english/advisories/2005/2548 •