Vulnerabilites related to phpbb - phpbb
Vulnerability from fkie_nvd
Published
2007-09-19 19:17
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in index.php in the Ktauber.com StylesDemo mod for phpBB 2.0.xx allows remote attackers to execute arbitrary SQL commands via the s parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ktauber | stylesdemo | 0.9.9 | |
phpbb | phpbb | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ktauber:stylesdemo:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "5BCB1A3E-C66C-4FDA-98C1-EE98154C9C1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "A95CA62B-6CE6-451A-946A-45CE7AD2423F", "versionEndIncluding": "2.0.22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in index.php in the Ktauber.com StylesDemo mod for phpBB 2.0.xx allows remote attackers to execute arbitrary SQL commands via the s parameter." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n SQL en el archivo index.php en Ktauber.com StylesDemo mod para phpBB versiones 2.0.xx, permite a atacantes remotos ejecutar comandos SQL arbitrarios por medio del par\u00e1metro s." } ], "id": "CVE-2007-4984", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-19T19:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/38264" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25710" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36689" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4425" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-17 16:15
Modified
2024-11-21 05:38
Severity ?
Summary
A vulnerability exists in phpBB <v3.2.10 and <v3.3.1 which allowed remote image dimensions check to be used to SSRF.
References
▶ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://www.phpbb.com/community/viewtopic.php?f=14&t=2562631 | Patch, Release Notes, Vendor Advisory | |
support@hackerone.com | https://www.phpbb.com/community/viewtopic.php?f=14&t=2562636 | Patch, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?f=14&t=2562631 | Patch, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?f=14&t=2562636 | Patch, Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED5FDD1B-B0C7-4EC0-A374-ADB3E1E9E726", "versionEndExcluding": "3.2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B49F9D3-E163-4BA4-B5F9-9D7FB2535094", "versionEndExcluding": "3.3.1", "versionStartIncluding": "3.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in phpBB \u003cv3.2.10 and \u003cv3.3.1 which allowed remote image dimensions check to be used to SSRF." }, { "lang": "es", "value": "Se presenta una vulnerabilidad en phpBB versiones anteriores a v3.2.10 y versiones anteriores a v3.3.1, que permiti\u00f3 que la comprobaci\u00f3n de las dimensiones de una imagen remota sea usada en un SSRF." } ], "id": "CVE-2020-8226", "lastModified": "2024-11-21T05:38:32.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-17T16:15:13.623", "references": [ { "source": "support@hackerone.com", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631" }, { "source": "support@hackerone.com", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-610" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in privmsg.php in phpBB 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the mark[] parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D08D3F47-E8FA-4FEC-A3D5-B01B0C1862D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in privmsg.php in phpBB 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the mark[] parameter." } ], "id": "CVE-2003-1530", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0125.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/7887/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/4277" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/307212/30/26300/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/6634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0125.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/7887/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/307212/30/26300/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/6634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-08 17:28
Modified
2025-04-09 00:30
Severity ?
Summary
phpBB 2.0.20 does not properly verify user-specified input variables used as limits to SQL queries, which allows remote attackers to obtain sensitive information via a negative LIMIT specification, as demonstrated by the start parameter to memberlist.php, which reveals the SQL query in the resulting error message.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "F981E005-EE40-4651-A8AF-F6487142DB02", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 2.0.20 does not properly verify user-specified input variables used as limits to SQL queries, which allows remote attackers to obtain sensitive information via a negative LIMIT specification, as demonstrated by the start parameter to memberlist.php, which reveals the SQL query in the resulting error message." }, { "lang": "es", "value": "phpBB 2.0.20 no verifica apropiadamente variables de entrada especificadas por el usuarios usadas como l\u00edmite para las consultas SQL, lo cual permite a atacantes remotos obtener informaci\u00f3n confidencial mediante una especificaci\u00f3n de l\u00edmite negativa, como se demuestra en el par\u00e1metro start en memberlist.php, que revela la consulta SQL en un mensaje de error resultante." } ], "id": "CVE-2006-2220", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-08T17:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=114695651425026\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=114731067321710\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=114685931319903\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/837" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=114695651425026\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=114731067321710\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=114685931319903\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26306" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-19 22:30
Modified
2025-04-11 00:51
Severity ?
Summary
feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "961AF172-F394-40FB-98ED-A5FCE290ED25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum." }, { "lang": "es", "value": "feed.php en phpBB v3.0.7 anterior a v3.0.7-PL1 no comprueba correctamente los permisos para feeds, lo que permite a usuarios remotos saltarse las restricciones de acceso a trav\u00e9s de vectores de ataque no especificados, relacionados con las configuraciones de permisos en un foro privado." } ], "id": "CVE-2010-1627", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-05-19T22:30:00.897", "references": [ { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/6" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-07-18 16:41
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and attack vectors related to "urls gone through redirect() being used within login_box()."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE17B2D1-1176-4DA8-8177-8FC5918A1A93", "versionEndIncluding": "3.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EFEFD3F1-87C7-45B9-B524-FF6DDD474C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6F9A1BA2-583C-4FFB-8E31-7F89EDC0A5AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "87E212D1-431B-4595-B0BF-520AE07A4A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "E5876E29-AFE1-4351-842F-C20055CB68CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "F08C7C49-7B1F-4C0D-BACF-6B80D25DA75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "BF7CD162-BAF6-43ED-B8B0-1D9C272BFCB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "3F75B66A-E334-4019-B09D-C5FC21329CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E962E706-3624-44B0-B97F-ABF8F0260957", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and attack vectors related to \"urls gone through redirect() being used within login_box().\"" }, { "lang": "es", "value": "Vulnerabilidad sin especificar en phpBB 3.0.1 tiene un impacto desconocido y vectores de ataque relacionados con \"URLs a las que se accede a trav\u00e9s de redirect() dentro de login_box ()\"." } ], "id": "CVE-2008-3224", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-18T16:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/12/1" }, { "source": "cve@mitre.org", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/12/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44208" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-10 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE6F91C-2F7A-4905-AEB4-EDC03131D412", "versionEndIncluding": "3.0.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors." }, { "lang": "es", "value": "La funci\u00f3n message_options en includes/ucp/ucp_pm_options.php en phpBB anterior a 3.0.13 no valida correctamente la clave del formulario, lo que permite a atacantes remotos realizar ataques de CSRF y cambiar la configuraci\u00f3n de ficheros completos a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-1432", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-10T17:59:01.290", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72399" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671" }, { "source": "cve@mitre.org", "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449" }, { "source": "cve@mitre.org", "url": "https://github.com/phpbb/phpbb/pull/3311" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201701-25" }, { "source": "cve@mitre.org", "url": "https://tracker.phpbb.com/browse/PHPBB3-13526" }, { "source": "cve@mitre.org", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/phpbb/phpbb/pull/3311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://tracker.phpbb.com/browse/PHPBB3-13526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-01-29 20:00
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "2F959028-8C40-4341-A9EB-BFE9C8951111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action." }, { "lang": "es", "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en privmsg.php en phpBB 2.0.22 permite a atacantes remotos borrar mensajes privados (PM) como un usuario de su elecci\u00f3n a trav\u00e9s de una acci\u00f3n deleteall.\r\n" } ], "id": "CVE-2008-0471", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-29T20:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28630" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28871" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3585" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1488" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487004/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487004/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-19 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | * | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.0 | |
phpbb | phpbb | 3.1.1 | |
phpbb | phpbb | 3.1.2 | |
phpbb | phpbb | 3.1.2 | |
phpbb | phpbb | 3.1.3 | |
phpbb | phpbb | 3.1.3 | |
phpbb | phpbb | 3.1.3 | |
phpbb | phpbb | 3.1.4 | |
phpbb | phpbb | 3.1.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "879A6940-F390-46AE-895C-B9FAA5466107", "versionEndIncluding": "3.0.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "777B75ED-200F-4B14-A153-00578F8411E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:a1:*:*:*:*:*:*", "matchCriteriaId": "0D3CF54F-2C83-41FA-A85C-BB4DE0958FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:a2:*:*:*:*:*:*", "matchCriteriaId": "B0D8B5CC-5EFA-4EA0-A26A-BEF56B45C153", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:a3:*:*:*:*:*:*", "matchCriteriaId": "7FBE812A-136E-4F29-98D1-5130BC9D1774", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:b1:*:*:*:*:*:*", "matchCriteriaId": "1B863B2D-5F98-4ACD-A359-49FC87373156", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:b2:*:*:*:*:*:*", "matchCriteriaId": "30D8CE28-7599-4F31-908B-E43D562C51B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:b3:*:*:*:*:*:*", "matchCriteriaId": "547F3F0D-E518-4073-B53B-E2741AA8F332", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:b4:*:*:*:*:*:*", "matchCriteriaId": "1333D93A-911C-4658-A851-AF65B1DE3B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "ACA9F03D-718F-45B3-881D-F6E8B89EA6B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C67751F3-3A75-4818-BBF1-CC961FD8B627", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "253272A0-48F4-4D91-A034-4E9A48C8A290", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "8C779E37-388F-45E4-B3C4-11C608F02F68", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "11E60CE4-6675-40DA-800A-092EE7B300AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "473BB97D-92A8-4BC1-852E-1846A0225201", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2E21370-A957-42FD-B15B-BC34D8570919", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E33457D9-45DE-4E89-98E6-7E42EDF8C71D", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "816AC4AC-F7DC-4A9C-AA7D-B69602CFBB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "72255A08-D10C-4649-B97A-37FD623C7E97", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E62D0D5-1497-4046-B314-99E598150CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "75B28F07-BF0D-43E9-93F6-C78D4080B3FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "5FD3875E-B71D-433E-8079-5E24980E59D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.1.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "5D2E7672-32D1-4564-AB72-5B0F885D00DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de redirecci\u00f3n abierta en phpBB en versiones anteriores a la 3.0.14 y 3.1.x anteriores a la 3.1.4 permite que los atacantes remotos redireccionen a los usuarios de Google Chrome a sitios web arbitrarios y lleven a cabo ataques de phishing mediante vectores sin especificar." } ], "id": "CVE-2015-3880", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-19T15:29:00.867", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/05/12/10" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74592" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.14" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.1.4" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/05/12/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.1.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-23 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E962E706-3624-44B0-B97F-ABF8F0260957", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE94F5A1-2850-4C32-8D77-9E601076C2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "85EF28FC-7EA3-4BC6-9997-8B90721C61CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDCB089B-5EB5-4886-9B95-0C2C3CA39D31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum." }, { "lang": "es", "value": "Una vulnerabilidad sin especificar en phpBB antes de la versi\u00f3n 3.0.4 permite a atacantes obtener informaci\u00f3n sensible a trav\u00e9s de vectores desconocidos relacionados con la ausencia de petici\u00f3n de contrase\u00f1a en un mensaje privado que cita una entrada de un foro protegido por contrase\u00f1a." } ], "id": "CVE-2008-6507", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-23T16:30:01.530", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33166" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/50806" }, { "source": "cve@mitre.org", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "source": "cve@mitre.org", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/50806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-09-04 22:17
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "A95CA62B-6CE6-451A-946A-45CE7AD2423F", "versionEndIncluding": "2.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en links.php en Links MOD 1.2.2 y anteriores para phpBB 2.0.22 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro star en un acci\u00f3n de b\u00fasqueda." } ], "id": "CVE-2007-4653", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-04T22:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/38427" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25501" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/38427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4346" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-30 12:15
Modified
2024-11-21 04:31
Severity ?
Summary
In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AA2974D-B61E-4490-A399-8B9B5898B49D", "versionEndIncluding": "3.1.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them." }, { "lang": "es", "value": "En phpBB versiones anteriores a 3.1.7-PL1, el archivo includes/acp/acp_bbcodes.php presenta una comprobaci\u00f3n inapropiada de un token de CSRF en la p\u00e1gina BBCode en el Panel de Control de Administraci\u00f3n. Un ataque de tipo CSRF real es posible si un atacante tambi\u00e9n logra recuperar el id de sesi\u00f3n de un administrador reautenticado antes de que sea atacado." } ], "id": "CVE-2019-16993", "lastModified": "2024-11-21T04:31:30.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-30T12:15:10.860", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00036.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2352606" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2352606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-05 06:29
Modified
2024-11-21 04:21
Severity ?
Summary
Server side request forgery (SSRF) in phpBB before 3.2.6 allows checking for the existence of files and services on the local network of the host through the remote avatar upload function.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B22B4BA-3C74-4CCC-919C-24C98334FE0B", "versionEndExcluding": "3.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server side request forgery (SSRF) in phpBB before 3.2.6 allows checking for the existence of files and services on the local network of the host through the remote avatar upload function." }, { "lang": "es", "value": "Server Side Request Forgery(SSRF) en phpBB versiones anteriores a la 3.2.6 permite comprobar la existencia de archivos y servicios en la red local del host a trav\u00e9s de la funci\u00f3n de carga remota de avatares." } ], "id": "CVE-2019-11767", "lastModified": "2024-11-21T04:21:45.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-05T06:29:00.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-10 04:06
Modified
2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in includes/functions_static_topics.php in the Nivisec Static Topics module for phpBB 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE9D88E1-8611-4AAC-867E-303B7893BBB0", "versionEndIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/functions_static_topics.php in the Nivisec Static Topics module for phpBB 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." }, { "lang": "es", "value": "Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en includes/functions_static_topics.php en the Nivisec Static Topics module para phpBB 1.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro phpbb_root_path." } ], "evaluatorSolution": "Successful exploitation requires that \"register_globals\" is enabled.", "id": "CVE-2006-5191", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-10-10T04:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22269" }, { "source": "cve@mitre.org", "url": "http://www.nivisec.com/article.php?l=vi\u0026ar=20" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/29506" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20353" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3916" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29347" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2477/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nivisec.com/article.php?l=vi\u0026ar=20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/29506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2477/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-17 13:29
Modified
2024-11-21 03:57
Severity ?
Summary
Passing an absolute path to a file_exists check in phpBB before 3.2.4 allows Remote Code Execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.phpbb.com/community/viewtopic.php?f=14&t=2492206 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?f=14&t=2492206 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "E43C932A-DEB2-4CB4-B2DB-AFFD11221049", "versionEndExcluding": "3.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Passing an absolute path to a file_exists check in phpBB before 3.2.4 allows Remote Code Execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions." }, { "lang": "es", "value": "El paso de una ruta absoluta a una comprobaci\u00f3n file_exists en phpBB en versiones anteriores a la 3.2.4 permite la ejecuci\u00f3n remota de c\u00f3digo mediante una inyecci\u00f3n de objetos al emplear la deserializaci\u00f3n Phar cuando un atacante tiene acceso al panel de control de administrador con permisos de fundador." } ], "id": "CVE-2018-19274", "lastModified": "2024-11-21T03:57:39.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-17T13:29:00.240", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" }, { "lang": "en", "value": "CWE-1321" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-15 00:15
Modified
2024-11-21 05:34
Severity ?
Summary
phpBB 3.2.8 allows a CSRF attack that can modify a group avatar.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9B8E7E17-68DE-456A-A639-C25E60751F12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.8 allows a CSRF attack that can modify a group avatar." }, { "lang": "es", "value": "phpBB versi\u00f3n 3.2.8, permite un ataque de tipo CSRF que puede modificar un avatar de grupo." } ], "id": "CVE-2020-5501", "lastModified": "2024-11-21T05:34:10.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-15T00:15:13.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-20 00:17
Modified
2024-11-21 04:30
Severity ?
Summary
phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.phpbb.com/community/viewtopic.php?t=2523271 | Patch, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?t=2523271 | Patch, Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4385F-3D63-4D4E-94AB-F96F7EED3A35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode." }, { "lang": "es", "value": "phpBB versi\u00f3n 3.2.7, permite agregar una secuencia de token arbitrario Cascading Style Sheets (CSS) a una p\u00e1gina por medio de BBCode." } ], "id": "CVE-2019-16108", "lastModified": "2024-11-21T04:30:03.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-20T00:17:09.043", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-02 19:29
Modified
2024-11-21 03:04
Severity ?
Summary
phpBB version 3.2.0 is vulnerable to SSRF in the Remote Avatar function resulting allowing an attacker to perform port scanning, requesting internal content and potentially attacking such internal services via the web application.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2E4ADB41-770D-41ED-A347-3EF025A9DFCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB version 3.2.0 is vulnerable to SSRF in the Remote Avatar function resulting allowing an attacker to perform port scanning, requesting internal content and potentially attacking such internal services via the web application." }, { "lang": "es", "value": "phpBB, en su versi\u00f3n 3.2.0, es vulnerable a SSRF en la funci\u00f3n Remote Avatar. Esto permite que un atacante realice un escaneo de puertos, solicitando contenido interno y atacando potencialmente tales servicios internos a trav\u00e9s de la aplicaci\u00f3n web." } ], "id": "CVE-2017-1000419", "lastModified": "2024-11-21T03:04:41.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-02T19:29:00.207", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-27 13:15
Modified
2024-11-21 04:24
Severity ?
Summary
phpBB version 3.2.7 allows the stealing of an Administration Control Panel session id by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking leads to stored XSS
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.phpbb.com/category/security/ | Exploit, Vendor Advisory | |
cve@mitre.org | https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.phpbb.com/category/security/ | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4385F-3D63-4D4E-94AB-F96F7EED3A35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB version 3.2.7 allows the stealing of an Administration Control Panel session id by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking leads to stored XSS" }, { "lang": "es", "value": "phpBB versi\u00f3n 3.2.7, permite el robo de un id de sesi\u00f3n del Panel de Control de Administraci\u00f3n mediante el aprovechamiento de una vulnerabilidad de tipo CSRF en la funcionalidad Remote Avatar. El secuestro de tokens CSRF conduce a XSS almacenado" } ], "id": "CVE-2019-13376", "lastModified": "2024-11-21T04:24:49.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-27T13:15:10.383", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-15 00:15
Modified
2024-11-21 05:34
Severity ?
Summary
phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9B8E7E17-68DE-456A-A639-C25E60751F12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships." }, { "lang": "es", "value": "phpBB versi\u00f3n 3.2.8, permite un ataque de tipo CSRF que puede aprobar membres\u00edas de grupo pendientes." } ], "id": "CVE-2020-5502", "lastModified": "2024-11-21T05:34:10.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-15T00:15:13.887", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.phpbb.com/category/security/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-09-18 17:59
Modified
2025-04-09 00:30
Severity ?
Summary
The search function in phpBB 2.x provides a search_id value that leaks the state of PHP's PRNG, which allows remote attackers to obtain potentially sensitive information, as demonstrated by a cross-application attack against WordPress, a different vulnerability than CVE-2006-0632.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2:*:*:*:*:*:*:*", "matchCriteriaId": "7FB07A06-3A4E-47F4-9B3F-3EDF16130EB2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The search function in phpBB 2.x provides a search_id value that leaks the state of PHP\u0027s PRNG, which allows remote attackers to obtain potentially sensitive information, as demonstrated by a cross-application attack against WordPress, a different vulnerability than CVE-2006-0632." }, { "lang": "es", "value": "La funci\u00f3n de b\u00fasqueda en phpBB 2.x proporciona un valor search_id que pierde el estado de PHP\u0027s PRNG, el cual permite a los atacantes remoto obtener potencialmente informaci\u00f3n sensible, como se demuestra por un ataque de aplicaciones cruzadas contra WordPress, vulnerabilidad diferente a CVE-2006-0632." } ], "id": "CVE-2008-4125", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-18T17:59:33.110", "references": [ { "source": "cve@mitre.org", "url": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45415" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-29 19:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple SQL injection vulnerabilities in directory.php in the Multi-Forums (aka Multi Host Forum Pro) module 1.3.3, for phpBB and Invision Power Board (IPB or IP.Board), allow remote attackers to execute arbitrary SQL commands via the (1) go and (2) cat parameters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
invision_power_services | invision_power_board | * | |
phpbb | phpbb | * | |
sebflipper | multi-forums_module | 1.3.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:invision_power_services:invision_power_board:*:*:*:*:*:*:*:*", "matchCriteriaId": "97F5B0EB-44D4-47C6-BEF9-E17787061471", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "8370A82D-83E8-4A70-8D04-1FCC6D24CAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sebflipper:multi-forums_module:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "076B4D89-3928-4017-95E9-7EA1D27D0B3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in directory.php in the Multi-Forums (aka Multi Host Forum Pro) module 1.3.3, for phpBB and Invision Power Board (IPB or IP.Board), allow remote attackers to execute arbitrary SQL commands via the (1) go and (2) cat parameters." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en directory.php en el m\u00f3dulo 1.3.3 de Multi-Forums (tambi\u00e9n conocido como Multi Host Forum Pro), para phpBB e Invision Power Board (IPB \u00f3 IP.Board), permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro (1) go y (2) cat." } ], "id": "CVE-2007-5688", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-29T19:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27406" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.inj3ct-it.org/exploit/Multi_Host.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/482838/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26213" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.inj3ct-it.org/exploit/Multi_Host.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/482838/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/26213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37461" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-02 11:15
Modified
2024-11-21 08:42
Severity ?
2.4 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4BB950E-CE3F-4EB3-B09D-EA1F60221A10", "versionEndExcluding": "3.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307." }, { "lang": "es", "value": "Una vulnerabilidad fue encontrada en phpBB hasta 3.3.10 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n principal del archivo phpBB/includes/acp/acp_icons.php del componente Smiley Pack Handler. La manipulaci\u00f3n del paquete de argumentos conduce a cross site scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.3.11 puede solucionar este problema. El parche se llama ccf6e6c255d38692d72fcb613b113e6eaa240aac. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-244307." } ], "id": "CVE-2023-5917", "lastModified": "2024-11-21T08:42:46.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-02T11:15:14.630", "references": [ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/phpbb/phpbb/commit/ccf6e6c255d38692d72fcb613b113e6eaa240aac" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://github.com/phpbb/phpbb/releases/tag/release-3.3.11" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.244307" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.244307" }, { "source": "cna@vuldb.com", "tags": [ "Product" ], "url": "https://www.phpbb.com/" }, { "source": "cna@vuldb.com", "tags": [ "Release Notes" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2646991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/phpbb/phpbb/commit/ccf6e6c255d38692d72fcb613b113e6eaa240aac" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/phpbb/phpbb/releases/tag/release-3.3.11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.244307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.244307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.phpbb.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2646991" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cna@vuldb.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-07-31 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "4176B2DC-A6FF-4A1C-ADC4-39F1D403FD73", "versionEndIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement." } ], "id": "CVE-2001-1471", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2001-07-31T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/920931" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/3167" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/920931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/3167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-10 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in includes/startup.php in phpBB before 3.0.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to "Relative Path Overwrite."
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFE6F91C-2F7A-4905-AEB4-EDC03131D412", "versionEndIncluding": "3.0.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in includes/startup.php in phpBB before 3.0.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to \"Relative Path Overwrite.\"" }, { "lang": "es", "value": "Vulnerabilidad de XSS en includes/startup.php en phpBB anterior a 3.0.13 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de vectores relacionados con \u0027la sobrescritura de rutas relativas.\u0027" } ], "id": "CVE-2015-1431", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-10T17:59:00.057", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72405" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670" }, { "source": "cve@mitre.org", "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e" }, { "source": "cve@mitre.org", "url": "https://github.com/phpbb/phpbb/pull/3316" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201701-25" }, { "source": "cve@mitre.org", "url": "https://tracker.phpbb.com/browse/PHPBB3-13531" }, { "source": "cve@mitre.org", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/phpbb/phpbb/pull/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201701-25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://tracker.phpbb.com/browse/PHPBB3-13531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
phpBB 2.0 through 2.0.3 generates names for uploaded avatar files with the hex-encoded IP address of the client system, which allows remote attackers to obtain client IP addresses.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6637E3D8-FBBA-45EF-ADCF-CFA5CF924069", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60B63076-D942-46B8-96DA-DD2ED812FCA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7924312D-46E8-456B-B920-36E33A719945", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D08D3F47-E8FA-4FEC-A3D5-B01B0C1862D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 2.0 through 2.0.3 generates names for uploaded avatar files with the hex-encoded IP address of the client system, which allows remote attackers to obtain client IP addresses." } ], "id": "CVE-2002-2346", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/archive/1/294560" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/10323.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/archive/1/294560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/10323.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5923" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 00:15
Modified
2024-11-21 01:24
Severity ?
Summary
phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "5644CC77-629C-4968-B88E-AD57F59F62E9", "versionEndIncluding": "3.0.6", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag." }, { "lang": "es", "value": "phpbb versiones 3.0.x-3.0.6, tiene una vulnerabilidad de tipo XSS por medio de la etiqueta BB [flash]." } ], "id": "CVE-2011-0544", "lastModified": "2024-11-21T01:24:15.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T00:15:10.767", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-0544" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-0544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-0544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-0544" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-20 10:19
Modified
2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://securityreason.com/securityalert/2450 | Exploit, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/448630/100/0/threaded | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/20516 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/29595 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/2450 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/448630/100/0/threaded | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/20516 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/29595 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:-:*:*:*:*:*:*:*", "matchCriteriaId": "008CFBE6-8B35-4CC1-9A75-8F77D12EA016", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." }, { "lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en includes/not_mem.php del m\u00f3dulo Add Name para PHP permite a atacantes remotos\r\nejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro phpbb_root_path." } ], "id": "CVE-2006-7168", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-20T10:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/2450" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/448630/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/20516" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/2450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/448630/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/20516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29595" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D08D3F47-E8FA-4FEC-A3D5-B01B0C1862D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode." } ], "id": "CVE-2002-2255", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2002-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/6311" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/6311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-02 21:29
Modified
2024-11-21 04:52
Severity ?
Summary
The fulltext search component in phpBB before 3.2.6 allows Denial of Service.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2019/04/29/3 | Mailing List, Mitigation, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html | ||
cve@mitre.org | https://www.phpbb.com/community/viewtopic.php?f=14&t=2509941 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/04/29/3 | Mailing List, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?f=14&t=2509941 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6F417F-1422-4767-8426-637A7B320019", "versionEndIncluding": "3.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The fulltext search component in phpBB before 3.2.6 allows Denial of Service." }, { "lang": "es", "value": "El componente de b\u00fasqueda de texto completo en PHP versi\u00f3n anterior a 3.2.6 permite una Denegaci\u00f3n de Servicio," } ], "id": "CVE-2019-9826", "lastModified": "2024-11-21T04:52:23.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-02T21:29:00.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/29/3" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/29/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-11 13:15
Modified
2024-11-21 04:30
Severity ?
Summary
Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.phpbb.com/community/viewforum.php?f=14 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://www.phpbb.com/community/viewtopic.php?t=2523271 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewforum.php?f=14 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.phpbb.com/community/viewtopic.php?t=2523271 | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4385F-3D63-4D4E-94AB-F96F7EED3A35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments." }, { "lang": "es", "value": "Una falta de comprobaci\u00f3n de tokens del formulario en phpBB versi\u00f3n 3.2.7, permite un ataque de tipo CSRF en una eliminaci\u00f3n de archivos adjuntos de publicaciones." } ], "id": "CVE-2019-16107", "lastModified": "2024-11-21T04:30:03.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-11T13:15:11.107", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewforum.php?f=14" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewforum.php?f=14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-12 20:05
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to "two minor security-related bugs."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:rc8:*:*:*:*:*:*", "matchCriteriaId": "2E3CA890-BF52-4A49-9F83-E1E9FA63BF80", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "C2380A73-A1DF-4790-B5A5-7BCE5855735A", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "AC9BF138-DF69-451C-986F-FDE7376D141B", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "0C66D15A-036B-42E9-ADF9-110F94E0B1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D5FB2232-56F1-4958-8374-EEEB8E61F1A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "7681FD73-A753-47EA-9DDA-F3C4F9A30E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0rc:1:*:*:*:*:*:*", "matchCriteriaId": "626618F6-3404-461E-A071-67E73C15EF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0rc:2:*:*:*:*:*:*", "matchCriteriaId": "00928BFE-2FFD-432F-A444-2256E722A1C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to \"two minor security-related bugs.\"" }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en phpBB anterior a 3.0.1 tienen un impacto desconocido y vectores de ataque, referidos a \" dos errores menores relacionados con la seguridad\"" } ], "id": "CVE-2008-1766", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-12T20:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1236/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1236/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41886" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-02-26 16:17
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in shoutbox_view.php in the Small ShoutBox module 1.4 for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
prezmo | small_shoutbox | 1.4 | |
phpbb | phpbb | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:prezmo:small_shoutbox:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2671785-6BFA-49B0-8C28-CB51A1DEABC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "8370A82D-83E8-4A70-8D04-1FCC6D24CAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in shoutbox_view.php in the Small ShoutBox module 1.4 for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en el archivo shoutbox_view.php en el m\u00f3dulo Small ShoutBox v1.4 para phpBB que permite a los atacantes remotos ejecutar arbitrariamente comandos SQL a trav\u00e9s del par\u00e1metro id en la acci\u00f3n de borrado." } ], "id": "CVE-2008-6301", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-26T16:17:19.780", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32565" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/32123" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46389" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/32123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6995" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-23 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | * | |
phpbb | phpbb | 1.0 | |
phpbb | phpbb | 2.0 | |
phpbb | phpbb | 2.0.1 | |
phpbb | phpbb | 2.0.2 | |
phpbb | phpbb | 2.0.3 | |
phpbb | phpbb | 2.0.22 | |
phpbb | phpbb | 2.01 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0 | |
phpbb | phpbb | 3.0.1 | |
phpbb | phpbb | 3.0.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF8238B0-BEED-4B7C-8431-622A69D25E3D", "versionEndIncluding": "3.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "60480BCC-6784-4A12-BBAC-A98181A362F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6637E3D8-FBBA-45EF-ADCF-CFA5CF924069", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60B63076-D942-46B8-96DA-DD2ED812FCA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7924312D-46E8-456B-B920-36E33A719945", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D08D3F47-E8FA-4FEC-A3D5-B01B0C1862D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "2F959028-8C40-4341-A9EB-BFE9C8951111", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "474A1EF7-AD8A-49B3-A629-5917081FB0AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF122E0D-ABB7-4042-A127-B061CD1F1165", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "EFEFD3F1-87C7-45B9-B524-FF6DDD474C00", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6F9A1BA2-583C-4FFB-8E31-7F89EDC0A5AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "87E212D1-431B-4595-B0BF-520AE07A4A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "E5876E29-AFE1-4351-842F-C20055CB68CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "F08C7C49-7B1F-4C0D-BACF-6B80D25DA75C", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "84BBDC01-58AA-4F1C-B5AD-5697AD538D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "BF7CD162-BAF6-43ED-B8B0-1D9C272BFCB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "3F75B66A-E334-4019-B09D-C5FC21329CF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE94F5A1-2850-4C32-8D77-9E601076C2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "85EF28FC-7EA3-4BC6-9997-8B90721C61CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no esp\u00e9cificada en phpBB anteriores a v3.0.4 permite a atacantes saltarse las restricciones de seguridad y activar cuentas desactivadas, a trav\u00e9s de vectores desconocidos.\r\n" } ], "id": "CVE-2008-6506", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-23T16:30:00.187", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33166" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/50806" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "source": "cve@mitre.org", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32842" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/50806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-01 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:2.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "C7381ECE-381B-4D77-9C32-829CC520424E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header." }, { "lang": "es", "value": "phpBB v2.0.23 incluye la el ID de sesi\u00f3n en una petici\u00f3n a modcp.php cuando el moderador o administrador cierra un hilo, lo que permite a atacantes remotos secuestrar la sesi\u00f3n a trav\u00e9s de un env\u00edo en el hilo conteniendo una URL a una imagen hospedada remotamente, que permite incluir el ID de sesi\u00f3n en la cabercera Referer." } ], "id": "CVE-2008-7143", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-09-01T16:30:00.530", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/51121" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/489815/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/51121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/489815/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-03 14:17
Modified
2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openid:openid:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "43999A8D-766E-4646-B275-C7AA535C75DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "8370A82D-83E8-4A70-8D04-1FCC6D24CAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter." }, { "lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en include/openid/Auth/OpenID/BBStore.php de phpBB Openid 0.2.0 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un URL en el par\u00e1metro openid_root_path." } ], "id": "CVE-2007-5173", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-03T14:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/37419" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27001" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25867" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3330" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/4471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/37419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/25867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/4471" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-12 17:44
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
chieminger | filebase_module | 2.0 | |
phpbb | phpbb | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chieminger:filebase_module:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4228B4B7-33FE-47B0-81DB-43799148C133", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "8370A82D-83E8-4A70-8D04-1FCC6D24CAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en filebase.php en el m\u00f3dulo Filebase para phpBB permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro id." } ], "id": "CVE-2008-1305", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-03-12T17:44:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28194" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41137" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5236" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-03 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
phpbb | phpbb | 3.0 | |
absoluteanime | prime_quick_style | 1.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF122E0D-ABB7-4042-A127-B061CD1F1165", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:absoluteanime:prime_quick_style:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "30E94124-565E-4A76-878B-E1BB0F41CDBA", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en root/includes/prime_quick_style.php en el complemento Prime Quick Style anterior a v1.2.3 para phpBB v3 permite a usuarios autenticados remotamente ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro prime_quick_style en ucp.php." } ], "id": "CVE-2009-3052", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-03T17:30:08.530", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36532" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/9569" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/36532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/9569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/36214" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-19 22:30
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a "forum id" in circumstances related to a "global announcement."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB1E601B-2614-48B7-98D1-68E43177AE23", "versionEndIncluding": "3.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E962E706-3624-44B0-B97F-ABF8F0260957", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A5346049-9041-4BE7-AAF1-FF32E75E33FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "ED55D851-A4FF-481E-813F-70349ADD3311", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "C2380A73-A1DF-4790-B5A5-7BCE5855735A", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "AC9BF138-DF69-451C-986F-FDE7376D141B", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "0C66D15A-036B-42E9-ADF9-110F94E0B1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "D5FB2232-56F1-4958-8374-EEEB8E61F1A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "7681FD73-A753-47EA-9DDA-F3C4F9A30E94", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "C7BE4E42-9784-4D61-8445-AF5AF5DA19C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE94F5A1-2850-4C32-8D77-9E601076C2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "85EF28FC-7EA3-4BC6-9997-8B90721C61CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:phpbb:phpbb:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDCB089B-5EB5-4886-9B95-0C2C3CA39D31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a \"forum id\" in circumstances related to a \"global announcement.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en posting.php de phpBB anterior a v3.0.5 tiene un impacto y vectores de ataque desconocidos relacionados con el uso de un \"forum id\" en circunstancias relacionadas con un \"global announcement\"." } ], "id": "CVE-2010-1630", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-05-19T22:30:01.067", "references": [ { "source": "secalert@redhat.com", "url": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/12" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/19/5" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/19/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-02-27 11:30
Modified
2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in tag_board.php in the Tag Board module 4.0 and earlier for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:tag_board:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE310B42-D048-48BF-9E23-F49629D08B15", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*", "matchCriteriaId": "8370A82D-83E8-4A70-8D04-1FCC6D24CAFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in tag_board.php in the Tag Board module 4.0 and earlier for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en tag_board.php del m\u00f3dulo Tag Board v4.0 y anteriores para phpBB, permite a los atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro \"id\" en una acci\u00f3n \"delete\"." } ], "id": "CVE-2008-6314", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-27T11:30:00.313", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/50600" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33031" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/32701" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47163" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/7386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/32701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/7386" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2008-0471 (GCVE-0-2008-0471)
Vulnerability from cvelistv5
Published
2008-01-29 19:00
Modified
2024-08-07 07:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:55.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28871" }, { "name": "3585", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3585" }, { "name": "DSA-1488", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1488" }, { "name": "28630", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28630" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589" }, { "name": "20080123 phpBB 2.0.22 Remote PM Delete XSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487004/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28871" }, { "name": "3585", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3585" }, { "name": "DSA-1488", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1488" }, { "name": "28630", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28630" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589" }, { "name": "20080123 phpBB 2.0.22 Remote PM Delete XSRF Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487004/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in privmsg.php in phpBB 2.0.22 allows remote attackers to delete private messages (PM) as arbitrary users via a deleteall action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28871", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28871" }, { "name": "3585", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3585" }, { "name": "DSA-1488", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1488" }, { "name": "28630", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28630" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463589" }, { "name": "20080123 phpBB 2.0.22 Remote PM Delete XSRF Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487004/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0471", "datePublished": "2008-01-29T19:00:00", "dateReserved": "2008-01-29T00:00:00", "dateUpdated": "2024-08-07T07:46:55.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6507 (GCVE-0-2008-6507)
Vulnerability from cvelistv5
Published
2009-03-23 16:00
Modified
2024-09-17 02:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:46.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33166" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/50806" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-23T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33166" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/50806" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33166" }, { "name": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303", "refsource": "CONFIRM", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "refsource": "OSVDB", "url": "http://www.osvdb.org/50806" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6507", "datePublished": "2009-03-23T16:00:00Z", "dateReserved": "2009-03-23T00:00:00Z", "dateUpdated": "2024-09-17T02:58:21.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-7168 (GCVE-0-2006-7168)
Vulnerability from cvelistv5
Published
2007-03-20 10:00
Modified
2024-08-07 20:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:39.596Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20061012 phpBB Add Name Remote File Include Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/448630/100/0/threaded" }, { "name": "20516", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20516" }, { "name": "2450", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2450" }, { "name": "phpbb-addname-notmem-file-include(29595)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20061012 phpBB Add Name Remote File Include Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/448630/100/0/threaded" }, { "name": "20516", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20516" }, { "name": "2450", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2450" }, { "name": "phpbb-addname-notmem-file-include(29595)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7168", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in includes/not_mem.php in the Add Name module for PHP allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20061012 phpBB Add Name Remote File Include Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/448630/100/0/threaded" }, { "name": "20516", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20516" }, { "name": "2450", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2450" }, { "name": "phpbb-addname-notmem-file-include(29595)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29595" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7168", "datePublished": "2007-03-20T10:00:00", "dateReserved": "2007-03-20T00:00:00", "dateUpdated": "2024-08-07T20:57:39.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1432 (GCVE-0-2015-1432)
Vulnerability from cvelistv5
Published
2015-02-10 17:00
Modified
2024-08-06 04:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "phpbb3-cve20151432-csrf(100671)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/pull/3311" }, { "name": "72399", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72399" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tracker.phpbb.com/browse/PHPBB3-13526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "phpbb3-cve20151432-csrf(100671)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/phpbb/phpbb/pull/3311" }, { "name": "72399", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72399" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tracker.phpbb.com/browse/PHPBB3-13526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The message_options function in includes/ucp/ucp_pm_options.php in phpBB before 3.0.13 does not properly validate the form key, which allows remote attackers to conduct CSRF attacks and change the full folder setting via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "name": "https://wiki.phpbb.com/Release_Highlights/3.0.13", "refsource": "CONFIRM", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "phpbb3-cve20151432-csrf(100671)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100671" }, { "name": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449", "refsource": "CONFIRM", "url": "https://github.com/phpbb/phpbb/commit/23069a13e203985ab124d1139e8de74b12778449" }, { "name": "https://github.com/phpbb/phpbb/pull/3311", "refsource": "CONFIRM", "url": "https://github.com/phpbb/phpbb/pull/3311" }, { "name": "72399", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72399" }, { "name": "https://tracker.phpbb.com/browse/PHPBB3-13526", "refsource": "CONFIRM", "url": "https://tracker.phpbb.com/browse/PHPBB3-13526" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1432", "datePublished": "2015-02-10T17:00:00", "dateReserved": "2015-01-31T00:00:00", "dateUpdated": "2024-08-06T04:40:18.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-9826 (GCVE-0-2019-9826)
Vulnerability from cvelistv5
Published
2019-05-02 20:43
Modified
2024-08-04 22:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The fulltext search component in phpBB before 3.2.6 allows Denial of Service.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190429 [CVE-2019-9826] phpBB Native Fulltext Search denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" }, { "name": "[debian-lts-announce] 20190504 [SECURITY] [DLA 1775-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The fulltext search component in phpBB before 3.2.6 allows Denial of Service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-04T13:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20190429 [CVE-2019-9826] phpBB Native Fulltext Search denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" }, { "name": "[debian-lts-announce] 20190504 [SECURITY] [DLA 1775-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9826", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fulltext search component in phpBB before 3.2.6 allows Denial of Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190429 [CVE-2019-9826] phpBB Native Fulltext Search denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/29/3" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" }, { "name": "[debian-lts-announce] 20190504 [SECURITY] [DLA 1775-1] phpbb3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9826", "datePublished": "2019-05-02T20:43:17", "dateReserved": "2019-03-14T00:00:00", "dateUpdated": "2024-08-04T22:01:55.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-2255 (GCVE-0-2002-2255)
Vulnerability from cvelistv5
Published
2007-10-14 20:00
Modified
2024-08-08 03:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:11.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6311" }, { "name": "phpbb-search-username-xss(10773)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773" }, { "name": "20021203 Cross-site Scripting Vulnerability in phpBB 2.0.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6311" }, { "name": "phpbb-search-username-xss(10773)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773" }, { "name": "20021203 Cross-site Scripting Vulnerability in phpBB 2.0.3", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in search.php in phpBB 2.0.3 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via the search_username parameter in searchuser mode." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6311" }, { "name": "phpbb-search-username-xss(10773)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10773" }, { "name": "20021203 Cross-site Scripting Vulnerability in phpBB 2.0.3", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-12/0053.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2255", "datePublished": "2007-10-14T20:00:00", "dateReserved": "2007-10-14T00:00:00", "dateUpdated": "2024-08-08T03:59:11.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6314 (GCVE-0-2008-6314)
Vulnerability from cvelistv5
Published
2009-02-27 11:00
Modified
2024-08-07 11:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in tag_board.php in the Tag Board module 4.0 and earlier for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:27:35.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33031" }, { "name": "32701", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32701" }, { "name": "50600", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/50600" }, { "name": "tagboard-tagboard-sql-injection(47163)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47163" }, { "name": "7386", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/7386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in tag_board.php in the Tag Board module 4.0 and earlier for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33031", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33031" }, { "name": "32701", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32701" }, { "name": "50600", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/50600" }, { "name": "tagboard-tagboard-sql-injection(47163)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47163" }, { "name": "7386", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/7386" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6314", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in tag_board.php in the Tag Board module 4.0 and earlier for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "33031", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33031" }, { "name": "32701", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32701" }, { "name": "50600", "refsource": "OSVDB", "url": "http://osvdb.org/50600" }, { "name": "tagboard-tagboard-sql-injection(47163)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47163" }, { "name": "7386", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/7386" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6314", "datePublished": "2009-02-27T11:00:00", "dateReserved": "2009-02-26T00:00:00", "dateUpdated": "2024-08-07T11:27:35.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0544 (GCVE-0-2011-0544)
Vulnerability from cvelistv5
Published
2019-11-13 23:05
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-Site Scripting
Summary
phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:24.950Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-0544" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-0544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "phpbb3", "vendor": "phpbb3", "versions": [ { "status": "affected", "version": "3.0.x-3.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-13T23:05:17", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-0544" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-0544" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-0544", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "phpbb3", "version": { "version_data": [ { "version_value": "3.0.x-3.0.6" } ] } } ] }, "vendor_name": "phpbb3" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpbb 3.0.x-3.0.6 has an XSS vulnerability via the [flash] BB tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2011-0544", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-0544" }, { "name": "https://access.redhat.com/security/cve/cve-2011-0544", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2011-0544" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0544", "datePublished": "2019-11-13T23:05:17", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:24.950Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-19274 (GCVE-0-2018-19274)
Vulnerability from cvelistv5
Published
2018-11-17 13:00
Modified
2024-08-05 11:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Passing an absolute path to a file_exists check in phpBB before 3.2.4 allows Remote Code Execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:30:04.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206" }, { "name": "[debian-lts-announce] 20181124 [SECURITY] [DLA 1593-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Passing an absolute path to a file_exists check in phpBB before 3.2.4 allows Remote Code Execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-25T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206" }, { "name": "[debian-lts-announce] 20181124 [SECURITY] [DLA 1593-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Passing an absolute path to a file_exists check in phpBB before 3.2.4 allows Remote Code Execution through Object Injection by employing Phar deserialization when an attacker has access to the Admin Control Panel with founder permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/", "refsource": "MISC", "url": "https://blog.ripstech.com/2018/phpbb3-phar-deserialization-to-remote-code-execution/" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2492206" }, { "name": "[debian-lts-announce] 20181124 [SECURITY] [DLA 1593-1] phpbb3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00029.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19274", "datePublished": "2018-11-17T13:00:00", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-05T11:30:04.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3880 (GCVE-0-2015-3880)
Vulnerability from cvelistv5
Published
2017-09-19 15:00
Modified
2024-08-06 05:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:56:16.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.1.4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04" }, { "name": "[oss-security] 20150512 Re: CVE Request: phpbb open redirect", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/05/12/10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941" }, { "name": "74592", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74592" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.1.4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04" }, { "name": "[oss-security] 20150512 Re: CVE Request: phpbb open redirect", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/05/12/10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941" }, { "name": "74592", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74592" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3880", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.phpbb.com/Release_Highlights/3.1.4", "refsource": "CONFIRM", "url": "https://wiki.phpbb.com/Release_Highlights/3.1.4" }, { "name": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04", "refsource": "CONFIRM", "url": "https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04" }, { "name": "[oss-security] 20150512 Re: CVE Request: phpbb open redirect", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/05/12/10" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2313941" }, { "name": "74592", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74592" }, { "name": "https://wiki.phpbb.com/Release_Highlights/3.0.14", "refsource": "CONFIRM", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.14" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3880", "datePublished": "2017-09-19T15:00:00", "dateReserved": "2015-05-12T00:00:00", "dateUpdated": "2024-08-06T05:56:16.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2220 (GCVE-0-2006-2220)
Vulnerability from cvelistv5
Published
2007-02-08 17:00
Modified
2024-08-07 17:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 2.0.20 does not properly verify user-specified input variables used as limits to SQL queries, which allows remote attackers to obtain sensitive information via a negative LIMIT specification, as demonstrated by the start parameter to memberlist.php, which reveals the SQL query in the resulting error message.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:43:28.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "phpbb-multiple-path-disclosure(26306)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26306" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=114695651425026\u0026w=2" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=114685931319903\u0026w=2" }, { "name": "837", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/837" }, { "name": "20060508 Re: phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=114731067321710\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "phpBB 2.0.20 does not properly verify user-specified input variables used as limits to SQL queries, which allows remote attackers to obtain sensitive information via a negative LIMIT specification, as demonstrated by the start parameter to memberlist.php, which reveals the SQL query in the resulting error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "phpbb-multiple-path-disclosure(26306)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26306" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=114695651425026\u0026w=2" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=114685931319903\u0026w=2" }, { "name": "837", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/837" }, { "name": "20060508 Re: phpBB 2.0.20 Full Path Disclosure and SQL Errors", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=114731067321710\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 2.0.20 does not properly verify user-specified input variables used as limits to SQL queries, which allows remote attackers to obtain sensitive information via a negative LIMIT specification, as demonstrated by the start parameter to memberlist.php, which reveals the SQL query in the resulting error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "phpbb-multiple-path-disclosure(26306)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26306" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=114695651425026\u0026w=2" }, { "name": "20060505 phpBB 2.0.20 Full Path Disclosure and SQL Errors", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=114685931319903\u0026w=2" }, { "name": "837", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/837" }, { "name": "20060508 Re: phpBB 2.0.20 Full Path Disclosure and SQL Errors", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=114731067321710\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2220", "datePublished": "2007-02-08T17:00:00", "dateReserved": "2006-05-05T00:00:00", "dateUpdated": "2024-08-07T17:43:28.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-7143 (GCVE-0-2008-7143)
Vulnerability from cvelistv5
Published
2009-09-01 16:00
Modified
2024-08-07 11:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:56:14.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "51121", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/51121" }, { "name": "20080318 phpBB 2.0.23 Session Hijacking Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/489815/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "51121", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/51121" }, { "name": "20080318 phpBB 2.0.23 Session Hijacking Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/489815/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-7143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 2.0.23 includes the session ID in a request to modcp.php when the moderator or administrator closes a thread, which allows remote attackers to hijack the session via a post in the thread containing a URL to a remotely hosted image, which might include the session ID in the Referer header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "51121", "refsource": "OSVDB", "url": "http://osvdb.org/51121" }, { "name": "20080318 phpBB 2.0.23 Session Hijacking Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/489815/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-7143", "datePublished": "2009-09-01T16:00:00", "dateReserved": "2009-09-01T00:00:00", "dateUpdated": "2024-08-07T11:56:14.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16107 (GCVE-0-2019-16107)
Vulnerability from cvelistv5
Published
2020-03-11 12:46
Modified
2024-08-05 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/community/viewforum.php?f=14" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-11T12:46:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/community/viewforum.php?f=14" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing form token validation in phpBB 3.2.7 allows CSRF in deleting post attachments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewforum.php?f=14", "refsource": "MISC", "url": "https://www.phpbb.com/community/viewforum.php?f=14" }, { "name": "https://www.phpbb.com/community/viewtopic.php?t=2523271", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16107", "datePublished": "2020-03-11T12:46:39", "dateReserved": "2019-09-08T00:00:00", "dateUpdated": "2024-08-05T01:03:32.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1530 (GCVE-0-2003-1530)
Vulnerability from cvelistv5
Published
2007-11-08 20:00
Modified
2024-08-08 02:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in privmsg.php in phpBB 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the mark[] parameter.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:16.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6634", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6634" }, { "name": "20030117 phpBB SQL Injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/307212/30/26300/threaded" }, { "name": "7887", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/7887/" }, { "name": "20030116 phpBB SQL Injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0125.html" }, { "name": "4277", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/4277" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in privmsg.php in phpBB 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the mark[] parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6634", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6634" }, { "name": "20030117 phpBB SQL Injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/307212/30/26300/threaded" }, { "name": "7887", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/7887/" }, { "name": "20030116 phpBB SQL Injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0125.html" }, { "name": "4277", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/4277" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in privmsg.php in phpBB 2.0.3 and earlier allows remote attackers to execute arbitrary SQL commands via the mark[] parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6634", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6634" }, { "name": "20030117 phpBB SQL Injection vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/307212/30/26300/threaded" }, { "name": "7887", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/7887/" }, { "name": "20030116 phpBB SQL Injection vulnerability", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2003-01/0125.html" }, { "name": "4277", "refsource": "OSVDB", "url": "http://www.osvdb.org/4277" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1530", "datePublished": "2007-11-08T20:00:00", "dateReserved": "2007-11-08T00:00:00", "dateUpdated": "2024-08-08T02:35:16.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-2346 (GCVE-0-2002-2346)
Vulnerability from cvelistv5
Published
2007-10-29 19:00
Modified
2024-09-16 23:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 2.0 through 2.0.3 generates names for uploaded avatar files with the hex-encoded IP address of the client system, which allows remote attackers to obtain client IP addresses.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:59:11.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "phpbb-avatar-ip-address(10323)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10323.php" }, { "name": "20021009 phpBB2 Showing users ip adresses", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/294560" }, { "name": "5923", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5923" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "phpBB 2.0 through 2.0.3 generates names for uploaded avatar files with the hex-encoded IP address of the client system, which allows remote attackers to obtain client IP addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-29T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "phpbb-avatar-ip-address(10323)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10323.php" }, { "name": "20021009 phpBB2 Showing users ip adresses", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/294560" }, { "name": "5923", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5923" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-2346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 2.0 through 2.0.3 generates names for uploaded avatar files with the hex-encoded IP address of the client system, which allows remote attackers to obtain client IP addresses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "phpbb-avatar-ip-address(10323)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10323.php" }, { "name": "20021009 phpBB2 Showing users ip adresses", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/294560" }, { "name": "5923", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5923" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-2346", "datePublished": "2007-10-29T19:00:00Z", "dateReserved": "2007-10-29T00:00:00Z", "dateUpdated": "2024-09-16T23:20:37.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-5502 (GCVE-0-2020-5502)
Vulnerability from cvelistv5
Published
2020-01-14 23:59
Modified
2024-08-04 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-14T23:59:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-5502", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 3.2.8 allows a CSRF attack that can approve pending group memberships." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.phpbb.com/category/security/", "refsource": "MISC", "url": "https://blog.phpbb.com/category/security/" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-5502", "datePublished": "2020-01-14T23:59:00", "dateReserved": "2020-01-05T00:00:00", "dateUpdated": "2024-08-04T08:30:24.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1766 (GCVE-0-2008-1766)
Vulnerability from cvelistv5
Published
2008-04-12 20:00
Modified
2024-08-07 08:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to "two minor security-related bugs."
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735" }, { "name": "phpbb-multiple-unspecified(41886)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41886" }, { "name": "ADV-2008-1236", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1236/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to \"two minor security-related bugs.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735" }, { "name": "phpbb-multiple-unspecified(41886)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41886" }, { "name": "ADV-2008-1236", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1236/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1766", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in phpBB before 3.0.1 have unknown impact and attack vectors, related to \"two minor security-related bugs.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=879735" }, { "name": "phpbb-multiple-unspecified(41886)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41886" }, { "name": "ADV-2008-1236", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1236/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1766", "datePublished": "2008-04-12T20:00:00", "dateReserved": "2008-04-12T00:00:00", "dateUpdated": "2024-08-07T08:32:01.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4984 (GCVE-0-2007-4984)
Vulnerability from cvelistv5
Published
2007-09-19 19:00
Modified
2024-08-07 15:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in index.php in the Ktauber.com StylesDemo mod for phpBB 2.0.xx allows remote attackers to execute arbitrary SQL commands via the s parameter.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:27.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38264", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38264" }, { "name": "25710", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25710" }, { "name": "stylesdemo-index-sql-injection(36689)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36689" }, { "name": "4425", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4425" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in index.php in the Ktauber.com StylesDemo mod for phpBB 2.0.xx allows remote attackers to execute arbitrary SQL commands via the s parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "38264", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38264" }, { "name": "25710", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25710" }, { "name": "stylesdemo-index-sql-injection(36689)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36689" }, { "name": "4425", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4425" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in index.php in the Ktauber.com StylesDemo mod for phpBB 2.0.xx allows remote attackers to execute arbitrary SQL commands via the s parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "38264", "refsource": "OSVDB", "url": "http://osvdb.org/38264" }, { "name": "25710", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25710" }, { "name": "stylesdemo-index-sql-injection(36689)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36689" }, { "name": "4425", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4425" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4984", "datePublished": "2007-09-19T19:00:00", "dateReserved": "2007-09-19T00:00:00", "dateUpdated": "2024-08-07T15:17:27.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5173 (GCVE-0-2007-5173)
Vulnerability from cvelistv5
Published
2007-10-03 14:00
Modified
2024-08-07 15:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:24:41.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded" }, { "name": "27001", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27001" }, { "name": "37419", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37419" }, { "name": "openid-bbstore-file-include(36876)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876" }, { "name": "ADV-2007-3330", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3330" }, { "name": "25867", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25867" }, { "name": "4471", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4471" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded" }, { "name": "27001", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27001" }, { "name": "37419", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37419" }, { "name": "openid-bbstore-file-include(36876)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876" }, { "name": "ADV-2007-3330", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3330" }, { "name": "25867", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25867" }, { "name": "4471", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4471" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5173", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070930 phpBB Mod OpenID 0.2.0 BBStore.php Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/481215/100/0/threaded" }, { "name": "27001", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27001" }, { "name": "37419", "refsource": "OSVDB", "url": "http://osvdb.org/37419" }, { "name": "openid-bbstore-file-include(36876)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36876" }, { "name": "ADV-2007-3330", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3330" }, { "name": "25867", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25867" }, { "name": "4471", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4471" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5173", "datePublished": "2007-10-03T14:00:00", "dateReserved": "2007-10-03T00:00:00", "dateUpdated": "2024-08-07T15:24:41.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16993 (GCVE-0-2019-16993)
Vulnerability from cvelistv5
Published
2019-09-30 11:30
Modified
2024-08-05 01:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2352606" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789" }, { "name": "[debian-lts-announce] 20190930 [SECURITY] [DLA 1942-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00036.html" }, { "name": "[debian-lts-announce] 20191007 [SECURITY] [DLA 1942-2] phpbb3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-07T09:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2352606" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789" }, { "name": "[debian-lts-announce] 20190930 [SECURITY] [DLA 1942-1] phpbb3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00036.html" }, { "name": "[debian-lts-announce] 20191007 [SECURITY] [DLA 1942-2] phpbb3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewtopic.php?t=2352606", "refsource": "MISC", "url": "https://www.phpbb.com/community/viewtopic.php?t=2352606" }, { "name": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317", "refsource": "MISC", "url": "https://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v317" }, { "name": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789", "refsource": "MISC", "url": "https://github.com/phpbb/phpbb/commit/18abef716ecf42a35416444f3f84f5459d573789" }, { "name": "[debian-lts-announce] 20190930 [SECURITY] [DLA 1942-1] phpbb3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00036.html" }, { "name": "[debian-lts-announce] 20191007 [SECURITY] [DLA 1942-2] phpbb3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16993", "datePublished": "2019-09-30T11:30:40", "dateReserved": "2019-09-30T00:00:00", "dateUpdated": "2024-08-05T01:24:48.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1000419 (GCVE-0-2017-1000419)
Vulnerability from cvelistv5
Published
2018-01-02 19:00
Modified
2024-09-17 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB version 3.2.0 is vulnerable to SSRF in the Remote Avatar function resulting allowing an attacker to perform port scanning, requesting internal content and potentially attacking such internal services via the web application.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:41.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "phpBB version 3.2.0 is vulnerable to SSRF in the Remote Avatar function resulting allowing an attacker to perform port scanning, requesting internal content and potentially attacking such internal services via the web application." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-02T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-12-29", "ID": "CVE-2017-1000419", "REQUESTER": "j.singh@sec-consult.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB version 3.2.0 is vulnerable to SSRF in the Remote Avatar function resulting allowing an attacker to perform port scanning, requesting internal content and potentially attacking such internal services via the web application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026p=14782136" }, { "name": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html", "refsource": "MISC", "url": "https://www.sec-consult.com/en/blog/advisories/phpbb-server-side-request-forgery-vulnerability/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000419", "datePublished": "2018-01-02T19:00:00Z", "dateReserved": "2018-01-02T00:00:00Z", "dateUpdated": "2024-09-17T03:07:02.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4653 (GCVE-0-2007-4653)
Vulnerability from cvelistv5
Published
2007-09-04 22:00
Modified
2024-08-07 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "4346", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/4346" }, { "name": "25501", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25501" }, { "name": "38427", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/38427" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "4346", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/4346" }, { "name": "25501", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25501" }, { "name": "38427", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/38427" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4653", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in links.php in the Links MOD 1.2.2 and earlier for phpBB 2.0.22 and earlier allows remote attackers to execute arbitrary SQL commands via the start parameter in a search action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "4346", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/4346" }, { "name": "25501", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25501" }, { "name": "38427", "refsource": "OSVDB", "url": "http://osvdb.org/38427" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4653", "datePublished": "2007-09-04T22:00:00", "dateReserved": "2007-09-04T00:00:00", "dateUpdated": "2024-08-07T15:01:09.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6506 (GCVE-0-2008-6506)
Vulnerability from cvelistv5
Published
2009-03-23 16:00
Modified
2024-08-07 11:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:47.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33166" }, { "name": "32842", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32842" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/50806" }, { "name": "phpbb-account-activation-security-bypass(47370)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33166" }, { "name": "32842", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32842" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/50806" }, { "name": "phpbb-account-activation-security-bypass(47370)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6506", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in phpBB before 3.0.4 allows attackers to bypass intended access restrictions and activate de-activated accounts via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1352565" }, { "name": "33166", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33166" }, { "name": "32842", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32842" }, { "name": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303", "refsource": "CONFIRM", "url": "http://www.phpbb.com/support/documents.php?mode=changelog\u0026version=3#v303" }, { "name": "[oss-security] 20090206 CVE request: phpbb \u003c 3.0.4", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/02/06/2" }, { "name": "50806", "refsource": "OSVDB", "url": "http://www.osvdb.org/50806" }, { "name": "phpbb-account-activation-security-bypass(47370)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47370" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6506", "datePublished": "2009-03-23T16:00:00", "dateReserved": "2009-03-23T00:00:00", "dateUpdated": "2024-08-07T11:34:47.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1627 (GCVE-0-2010-1627)
Vulnerability from cvelistv5
Published
2010-05-19 22:00
Modified
2024-09-17 00:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-19T22:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "feed.php in phpBB 3.0.7 before 3.0.7-PL1 does not properly check permissions for feeds, which allows remote attackers to bypass intended access restrictions via unspecified attack vectors related to permission settings on a private forum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/6" }, { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2014195" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1627", "datePublished": "2010-05-19T22:00:00Z", "dateReserved": "2010-04-29T00:00:00Z", "dateUpdated": "2024-09-17T00:11:47.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-13376 (GCVE-0-2019-13376)
Vulnerability from cvelistv5
Published
2019-09-27 12:08
Modified
2024-08-04 23:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB version 3.2.7 allows the stealing of an Administration Control Panel session id by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking leads to stored XSS
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:49:24.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "phpBB version 3.2.7 allows the stealing of an Administration Control Panel session id by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking leads to stored XSS" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-27T12:09:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13376", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB version 3.2.7 allows the stealing of an Administration Control Panel session id by leveraging CSRF in the Remote Avatar feature. The CSRF Token Hijacking leads to stored XSS" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.phpbb.com/category/security/", "refsource": "MISC", "url": "https://blog.phpbb.com/category/security/" }, { "name": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss", "refsource": "MISC", "url": "https://ssd-disclosure.com/archives/4007/ssd-advisory-phpbb-csrf-token-hijacking-leading-to-stored-xss" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13376", "datePublished": "2019-09-27T12:08:57", "dateReserved": "2019-07-07T00:00:00", "dateUpdated": "2024-08-04T23:49:24.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1630 (GCVE-0-2010-1630)
Vulnerability from cvelistv5
Published
2010-05-19 22:00
Modified
2024-09-16 20:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a "forum id" in circumstances related to a "global announcement."
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657" }, { "name": "[oss-security] 20100519 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/19/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a \"forum id\" in circumstances related to a \"global announcement.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-19T22:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/12" }, { "tags": [ "x_refsource_MISC" ], "url": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657" }, { "name": "[oss-security] 20100519 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/19/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in posting.php in phpBB before 3.0.5 has unknown impact and attack vectors related to the use of a \"forum id\" in circumstances related to a \"global announcement.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20100518 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/12" }, { "name": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657", "refsource": "MISC", "url": "http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657" }, { "name": "[oss-security] 20100519 Re: CVE request: phpbb 3.0.7 and before 3.0.5", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/05/19/5" }, { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026p=9764445" }, { "name": "[oss-security] 20100517 CVE request: phpbb 3.0.7 and before 3.0.5", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/05/16/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1630", "datePublished": "2010-05-19T22:00:00Z", "dateReserved": "2010-04-29T00:00:00Z", "dateUpdated": "2024-09-16T20:06:19.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5191 (GCVE-0-2006-5191)
Vulnerability from cvelistv5
Published
2006-10-06 19:00
Modified
2024-08-07 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in includes/functions_static_topics.php in the Nivisec Static Topics module for phpBB 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:41:05.016Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29506", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/29506" }, { "name": "2477", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2477/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.nivisec.com/article.php?l=vi\u0026ar=20" }, { "name": "20353", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20353" }, { "name": "ADV-2006-3916", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3916" }, { "name": "22269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22269" }, { "name": "phpbb-functionsstatictopics-file-include(29347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29347" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in includes/functions_static_topics.php in the Nivisec Static Topics module for phpBB 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29506", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/29506" }, { "name": "2477", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2477/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.nivisec.com/article.php?l=vi\u0026ar=20" }, { "name": "20353", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20353" }, { "name": "ADV-2006-3916", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3916" }, { "name": "22269", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22269" }, { "name": "phpbb-functionsstatictopics-file-include(29347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29347" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5191", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in includes/functions_static_topics.php in the Nivisec Static Topics module for phpBB 1.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29506", "refsource": "OSVDB", "url": "http://www.osvdb.org/29506" }, { "name": "2477", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2477/" }, { "name": "http://www.nivisec.com/article.php?l=vi\u0026ar=20", "refsource": "CONFIRM", "url": "http://www.nivisec.com/article.php?l=vi\u0026ar=20" }, { "name": "20353", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20353" }, { "name": "ADV-2006-3916", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3916" }, { "name": "22269", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22269" }, { "name": "phpbb-functionsstatictopics-file-include(29347)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29347" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5191", "datePublished": "2006-10-06T19:00:00", "dateReserved": "2006-10-06T00:00:00", "dateUpdated": "2024-08-07T19:41:05.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2001-1471 (GCVE-0-2001-1471)
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 04:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:58:11.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20010804 Re: phpBB 1.4.0 bug leads to easy admin privileges", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html" }, { "name": "20010810 Easily and Remotely Pipe a Covert Shell on phpBB version 1.4.0 and below", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html" }, { "name": "phpbb-admin-access(6944)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" }, { "name": "VU#920931", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/920931" }, { "name": "3167", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3167" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20010804 Re: phpBB 1.4.0 bug leads to easy admin privileges", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html" }, { "name": "20010810 Easily and Remotely Pipe a Covert Shell on phpBB version 1.4.0 and below", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html" }, { "name": "phpbb-admin-access(6944)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" }, { "name": "VU#920931", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/920931" }, { "name": "3167", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3167" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20010804 Re: phpBB 1.4.0 bug leads to easy admin privileges", "refsource": "BUGTRAQ", "url": "http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2001-08/0087.html" }, { "name": "20010810 Easily and Remotely Pipe a Covert Shell on phpBB version 1.4.0 and below", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-08/0123.html" }, { "name": "phpbb-admin-access(6944)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6944" }, { "name": "VU#920931", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/920931" }, { "name": "3167", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3167" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1471", "datePublished": "2005-04-21T04:00:00", "dateReserved": "2005-04-21T00:00:00", "dateUpdated": "2024-08-08T04:58:11.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5688 (GCVE-0-2007-5688)
Vulnerability from cvelistv5
Published
2007-10-29 19:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple SQL injection vulnerabilities in directory.php in the Multi-Forums (aka Multi Host Forum Pro) module 1.3.3, for phpBB and Invision Power Board (IPB or IP.Board), allow remote attackers to execute arbitrary SQL commands via the (1) go and (2) cat parameters.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26213", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26213" }, { "name": "phpbb-multiforums-sql-injection(37461)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37461" }, { "name": "27406", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27406" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.inj3ct-it.org/exploit/Multi_Host.txt" }, { "name": "20071025 Multi Host Forum Pro phpbb \u0026 ipb Multiple Sql Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/482838/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in directory.php in the Multi-Forums (aka Multi Host Forum Pro) module 1.3.3, for phpBB and Invision Power Board (IPB or IP.Board), allow remote attackers to execute arbitrary SQL commands via the (1) go and (2) cat parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26213", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26213" }, { "name": "phpbb-multiforums-sql-injection(37461)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37461" }, { "name": "27406", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27406" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.inj3ct-it.org/exploit/Multi_Host.txt" }, { "name": "20071025 Multi Host Forum Pro phpbb \u0026 ipb Multiple Sql Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/482838/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in directory.php in the Multi-Forums (aka Multi Host Forum Pro) module 1.3.3, for phpBB and Invision Power Board (IPB or IP.Board), allow remote attackers to execute arbitrary SQL commands via the (1) go and (2) cat parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26213", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26213" }, { "name": "phpbb-multiforums-sql-injection(37461)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37461" }, { "name": "27406", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27406" }, { "name": "http://www.inj3ct-it.org/exploit/Multi_Host.txt", "refsource": "MISC", "url": "http://www.inj3ct-it.org/exploit/Multi_Host.txt" }, { "name": "20071025 Multi Host Forum Pro phpbb \u0026 ipb Multiple Sql Injection", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/482838/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5688", "datePublished": "2007-10-29T19:00:00", "dateReserved": "2007-10-29T00:00:00", "dateUpdated": "2024-08-07T15:39:13.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-8226 (GCVE-0-2020-8226)
Vulnerability from cvelistv5
Published
2020-08-17 15:37
Modified
2024-08-04 09:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-610 - Externally Controlled Reference to a Resource in Another Sphere ()
Summary
A vulnerability exists in phpBB <v3.2.10 and <v3.3.1 which allowed remote image dimensions check to be used to SSRF.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | https://github.com/phpbb/phpbb |
Version: 3.2.10 and 3.3.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:27.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "https://github.com/phpbb/phpbb", "vendor": "n/a", "versions": [ { "status": "affected", "version": "3.2.10 and 3.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in phpBB \u003cv3.2.10 and \u003cv3.3.1 which allowed remote image dimensions check to be used to SSRF." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "Externally Controlled Reference to a Resource in Another Sphere (CWE-610)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-17T15:37:51", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "https://github.com/phpbb/phpbb", "version": { "version_data": [ { "version_value": "3.2.10 and 3.3.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability exists in phpBB \u003cv3.2.10 and \u003cv3.3.1 which allowed remote image dimensions check to be used to SSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Externally Controlled Reference to a Resource in Another Sphere (CWE-610)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631", "refsource": "MISC", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562631" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636", "refsource": "MISC", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2562636" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8226", "datePublished": "2020-08-17T15:37:51", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:27.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-3052 (GCVE-0-2009-3052)
Vulnerability from cvelistv5
Published
2009-09-03 17:00
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:14:55.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315" }, { "name": "36532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36532" }, { "name": "36214", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36214" }, { "name": "9569", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/9569" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-09-01T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315" }, { "name": "36532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36532" }, { "name": "36214", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36214" }, { "name": "9569", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/9569" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-3052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in root/includes/prime_quick_style.php in the Prime Quick Style addon before 1.2.3 for phpBB 3 allows remote authenticated users to execute arbitrary SQL commands via the prime_quick_style parameter to ucp.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315", "refsource": "MISC", "url": "http://www.phpbb.com/community/viewtopic.php?f=70\u0026t=692625\u0026start=150#p10649315" }, { "name": "36532", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36532" }, { "name": "36214", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36214" }, { "name": "9569", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/9569" }, { "name": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml", "refsource": "MISC", "url": "http://www.absoluteanime.com/forum/mods/Prime%20Quick%20Style/install.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-3052", "datePublished": "2009-09-03T17:00:00", "dateReserved": "2009-09-03T00:00:00", "dateUpdated": "2024-08-07T06:14:55.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1431 (GCVE-0-2015-1431)
Vulnerability from cvelistv5
Published
2015-02-10 17:00
Modified
2024-08-06 04:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in includes/startup.php in phpBB before 3.0.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to "Relative Path Overwrite."
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/pull/3316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tracker.phpbb.com/browse/PHPBB3-13531" }, { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "72405", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72405" }, { "name": "phpbb3-cve20151431-xss(100670)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in includes/startup.php in phpBB before 3.0.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to \"Relative Path Overwrite.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/phpbb/phpbb/pull/3316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tracker.phpbb.com/browse/PHPBB3-13531" }, { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "72405", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72405" }, { "name": "phpbb3-cve20151431-xss(100670)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in includes/startup.php in phpBB before 3.0.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to \"Relative Path Overwrite.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/phpbb/phpbb/pull/3316", "refsource": "CONFIRM", "url": "https://github.com/phpbb/phpbb/pull/3316" }, { "name": "https://tracker.phpbb.com/browse/PHPBB3-13531", "refsource": "CONFIRM", "url": "https://tracker.phpbb.com/browse/PHPBB3-13531" }, { "name": "[oss-security] 20150131 Re: CVE request: phpbb3 CSRF and CSS injection", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2015/q1/373" }, { "name": "https://wiki.phpbb.com/Release_Highlights/3.0.13", "refsource": "CONFIRM", "url": "https://wiki.phpbb.com/Release_Highlights/3.0.13" }, { "name": "GLSA-201701-25", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201701-25" }, { "name": "72405", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72405" }, { "name": "phpbb3-cve20151431-xss(100670)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100670" }, { "name": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e", "refsource": "CONFIRM", "url": "https://github.com/phpbb/phpbb/commit/eaeb88133f1f028fa06f0ebe5639668436fd469e" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1431", "datePublished": "2015-02-10T17:00:00", "dateReserved": "2015-01-31T00:00:00", "dateUpdated": "2024-08-06T04:40:18.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-5917 (GCVE-0-2023-5917)
Vulnerability from cvelistv5
Published
2023-11-02 10:31
Modified
2025-02-27 20:36
Severity ?
2.4 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
2.4 (Low) - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
2.4 (Low) - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross Site Scripting
Summary
A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.244307" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.244307" }, { "tags": [ "related", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2646991" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/commit/ccf6e6c255d38692d72fcb613b113e6eaa240aac" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/phpbb/phpbb/releases/tag/release-3.3.11" }, { "tags": [ "product", "x_transferred" ], "url": "https://www.phpbb.com/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5917", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T21:48:36.421754Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:36:00.959Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Smiley Pack Handler" ], "product": "phpBB", "vendor": "n/a", "versions": [ { "status": "affected", "version": "3.3.0" }, { "status": "affected", "version": "3.3.1" }, { "status": "affected", "version": "3.3.2" }, { "status": "affected", "version": "3.3.3" }, { "status": "affected", "version": "3.3.4" }, { "status": "affected", "version": "3.3.5" }, { "status": "affected", "version": "3.3.6" }, { "status": "affected", "version": "3.3.7" }, { "status": "affected", "version": "3.3.8" }, { "status": "affected", "version": "3.3.9" }, { "status": "affected", "version": "3.3.10" } ] } ], "credits": [ { "lang": "en", "type": "analyst", "value": "shin24 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307." }, { "lang": "de", "value": "Eine Schwachstelle wurde in phpBB bis 3.3.10 entdeckt. Sie wurde als problematisch eingestuft. Dies betrifft die Funktion main der Datei phpBB/includes/acp/acp_icons.php der Komponente Smiley Pack Handler. Durch Manipulieren des Arguments pak mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Ein Aktualisieren auf die Version 3.3.11 vermag dieses Problem zu l\u00f6sen. Der Patch wird als ccf6e6c255d38692d72fcb613b113e6eaa240aac bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 3.3, "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross Site Scripting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-02T10:31:07.376Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.244307" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.244307" }, { "tags": [ "related" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2646991" }, { "tags": [ "patch" ], "url": "https://github.com/phpbb/phpbb/commit/ccf6e6c255d38692d72fcb613b113e6eaa240aac" }, { "tags": [ "patch" ], "url": "https://github.com/phpbb/phpbb/releases/tag/release-3.3.11" }, { "tags": [ "product" ], "url": "https://www.phpbb.com/" } ], "timeline": [ { "lang": "en", "time": "2023-11-02T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-11-02T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-11-02T07:03:01.000Z", "value": "VulDB entry last update" } ], "title": "phpBB Smiley Pack acp_icons.php main cross site scripting" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2023-5917", "datePublished": "2023-11-02T10:31:07.376Z", "dateReserved": "2023-11-02T05:56:46.346Z", "dateUpdated": "2025-02-27T20:36:00.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4125 (GCVE-0-2008-4125)
Vulnerability from cvelistv5
Published
2008-09-18 17:47
Modified
2024-08-07 10:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The search function in phpBB 2.x provides a search_id value that leaks the state of PHP's PRNG, which allows remote attackers to obtain potentially sensitive information, as demonstrated by a cross-application attack against WordPress, a different vulnerability than CVE-2006-0632.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:08:33.641Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "phpbb-search-information-disclosure(45415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45415" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The search function in phpBB 2.x provides a search_id value that leaks the state of PHP\u0027s PRNG, which allows remote attackers to obtain potentially sensitive information, as demonstrated by a cross-application attack against WordPress, a different vulnerability than CVE-2006-0632." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "phpbb-search-information-disclosure(45415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45415" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The search function in phpBB 2.x provides a search_id value that leaks the state of PHP\u0027s PRNG, which allows remote attackers to obtain potentially sensitive information, as demonstrated by a cross-application attack against WordPress, a different vulnerability than CVE-2006-0632." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "phpbb-search-information-disclosure(45415)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45415" }, { "name": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/", "refsource": "MISC", "url": "http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4125", "datePublished": "2008-09-18T17:47:00", "dateReserved": "2008-09-18T00:00:00", "dateUpdated": "2024-08-07T10:08:33.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11767 (GCVE-0-2019-11767)
Vulnerability from cvelistv5
Published
2019-05-05 05:29
Modified
2024-08-04 23:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Server side request forgery (SSRF) in phpBB before 3.2.6 allows checking for the existence of files and services on the local network of the host through the remote avatar upload function.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:03:32.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Server side request forgery (SSRF) in phpBB before 3.2.6 allows checking for the existence of files and services on the local network of the host through the remote avatar upload function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-05T05:29:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11767", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Server side request forgery (SSRF) in phpBB before 3.2.6 allows checking for the existence of files and services on the local network of the host through the remote avatar upload function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941", "refsource": "MISC", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2509941" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11767", "datePublished": "2019-05-05T05:29:08", "dateReserved": "2019-05-05T00:00:00", "dateUpdated": "2024-08-04T23:03:32.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16108 (GCVE-0-2019-16108)
Vulnerability from cvelistv5
Published
2020-03-19 23:03
Modified
2024-08-05 01:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:03:32.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-19T23:03:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 3.2.7 allows adding an arbitrary Cascading Style Sheets (CSS) token sequence to a page through BBCode." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.phpbb.com/community/viewtopic.php?t=2523271", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?t=2523271" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16108", "datePublished": "2020-03-19T23:03:08", "dateReserved": "2019-09-08T00:00:00", "dateUpdated": "2024-08-05T01:03:32.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-5501 (GCVE-0-2020-5501)
Vulnerability from cvelistv5
Published
2020-01-14 23:57
Modified
2024-08-04 08:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
phpBB 3.2.8 allows a CSRF attack that can modify a group avatar.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:24.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "phpBB 3.2.8 allows a CSRF attack that can modify a group avatar." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-14T23:57:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.phpbb.com/category/security/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-5501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "phpBB 3.2.8 allows a CSRF attack that can modify a group avatar." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.phpbb.com/category/security/", "refsource": "MISC", "url": "https://blog.phpbb.com/category/security/" }, { "name": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536", "refsource": "CONFIRM", "url": "https://www.phpbb.com/community/viewtopic.php?f=14\u0026t=2534536" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-5501", "datePublished": "2020-01-14T23:57:43", "dateReserved": "2020-01-05T00:00:00", "dateUpdated": "2024-08-04T08:30:24.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-3224 (GCVE-0-2008-3224)
Vulnerability from cvelistv5
Published
2008-07-18 16:00
Modified
2024-08-07 09:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and attack vectors related to "urls gone through redirect() being used within login_box()."
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20080712 CVE request: phpbb \u003c 3.0.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/12/1" }, { "name": "phpbb-urls-unspecified(44208)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44208" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and attack vectors related to \"urls gone through redirect() being used within login_box().\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20080712 CVE request: phpbb \u003c 3.0.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/12/1" }, { "name": "phpbb-urls-unspecified(44208)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44208" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and attack vectors related to \"urls gone through redirect() being used within login_box().\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20080712 CVE request: phpbb \u003c 3.0.2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/12/1" }, { "name": "phpbb-urls-unspecified(44208)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44208" }, { "name": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33", "refsource": "CONFIRM", "url": "http://www.phpbb.com/community/viewtopic.php?f=14\u0026t=1059565\u0026sid=2d3a6352a484588e1ad80f09dd19fe33" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3224", "datePublished": "2008-07-18T16:00:00", "dateReserved": "2008-07-18T00:00:00", "dateUpdated": "2024-08-07T09:28:41.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6301 (GCVE-0-2008-6301)
Vulnerability from cvelistv5
Published
2009-02-26 16:00
Modified
2024-08-07 11:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in shoutbox_view.php in the Small ShoutBox module 1.4 for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:27:35.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "smallshoutbox-shoutboxview-sql-injection(46389)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46389" }, { "name": "6995", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6995" }, { "name": "32565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32565" }, { "name": "32123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in shoutbox_view.php in the Small ShoutBox module 1.4 for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "smallshoutbox-shoutboxview-sql-injection(46389)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46389" }, { "name": "6995", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6995" }, { "name": "32565", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32565" }, { "name": "32123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in shoutbox_view.php in the Small ShoutBox module 1.4 for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter in a delete action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "smallshoutbox-shoutboxview-sql-injection(46389)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46389" }, { "name": "6995", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6995" }, { "name": "32565", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32565" }, { "name": "32123", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6301", "datePublished": "2009-02-26T16:00:00", "dateReserved": "2009-02-26T00:00:00", "dateUpdated": "2024-08-07T11:27:35.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-1305 (GCVE-0-2008-1305)
Vulnerability from cvelistv5
Published
2008-03-12 17:00
Modified
2024-08-07 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28194", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28194" }, { "name": "5236", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5236" }, { "name": "phpbb-filebase-sql-injection(41137)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41137" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28194", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28194" }, { "name": "5236", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5236" }, { "name": "phpbb-filebase-sql-injection(41137)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41137" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in filebase.php in the Filebase mod for phpBB allows remote attackers to execute arbitrary SQL commands via the id parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28194", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28194" }, { "name": "5236", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5236" }, { "name": "phpbb-filebase-sql-injection(41137)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41137" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1305", "datePublished": "2008-03-12T17:00:00", "dateReserved": "2008-03-12T00:00:00", "dateUpdated": "2024-08-07T08:17:34.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }