Show filters
87 Total Results
Displaying 41-50 of 87
Sort by:
Attacker Value
Unknown
CVE-2011-5083
Disclosure Date: March 19, 2012 (last updated October 04, 2023)
Unrestricted file upload vulnerability in inc/swf/swfupload.swf in Dotclear 2.3.1 and 2.4.2 allows remote attackers to execute arbitrary code by uploading a file with an executable PHP extension, then accessing it via a direct request to the file in an unspecified directory.
0
Attacker Value
Unknown
CVE-2010-4924
Disclosure Date: October 09, 2011 (last updated November 08, 2023)
PHP remote file inclusion vulnerability in logic/controller.class.php in clearBudget 0.9.8 allows remote attackers to execute arbitrary PHP code via a URL in the actionPath parameter. NOTE: this issue has been disputed by a reliable third party
0
Attacker Value
Unknown
CVE-2011-1584
Disclosure Date: June 08, 2011 (last updated October 04, 2023)
The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2010-4507
Disclosure Date: December 30, 2010 (last updated October 04, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities on the iSpot 2.0.0.0 R1679, and the ClearSpot 2.0.0.0 R1512 and R1786, with firmware 1.9.9.4 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary commands via the cmd parameter in an act_cmd_result action to webmain.cgi, (2) enable remote management via an enable_remote_access act_network_set action to webmain.cgi, (3) enable the TELNET service via an ENABLE_TELNET act_set_wimax_etc_config action to webmain.cgi, (4) enable TELNET sessions via a certain act_network_set action to webmain.cgi, or (5) read arbitrary files via the FILE_PATH parameter in an act_file_download action to upgrademain.cgi.
0
Attacker Value
Unknown
CVE-2009-3535
Disclosure Date: October 02, 2009 (last updated October 04, 2023)
Directory traversal vulnerability in image.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the researcher also suggests an analogous PHP remote file inclusion vulnerability, but this may be incorrect.
0
Attacker Value
Unknown
CVE-2009-3538
Disclosure Date: October 02, 2009 (last updated October 04, 2023)
Directory traversal vulnerability in thumb.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2009-0933
Disclosure Date: March 17, 2009 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in the administrative interface in Dotclear before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2008-3232
Disclosure Date: July 18, 2008 (last updated October 04, 2023)
Unrestricted file upload vulnerability in ecrire/images.php in Dotclear 1.2.7.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images.
0
Attacker Value
Unknown
CVE-2007-5481
Disclosure Date: October 16, 2007 (last updated October 04, 2023)
Distributed Checksum Clearinghouse (DCC) 1.3.65 allows remote attackers to cause a denial of service (crash) via a "SOCKS flood."
0
Attacker Value
Unknown
CVE-2007-4906
Disclosure Date: September 17, 2007 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in tasks/send_queued_emails.php in NuclearBB Alpha 2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
0