Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.54203
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: phpbb
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: phpbb

CVE-2005-0258
Directory traversal vulnerability in (1) usercp_register.php and (2)
usercp_avatar.php for phpBB 2.0.11, and possibly other versions, with
gallery avatars enabled, allows remote attackers to delete (unlink)
arbitrary files via '/../' sequences in the avatarselect parameter.

CVE-2005-0259
phpBB 2.0.11, and possibly other versions, with remote avatars and
avatar uploading enabled, allows local users to read arbitrary files
by providing both a local and remote location for an avatar, then
modifying the 'Upload Avatar from a URL:' field to reference the
target file.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-0258
http://www.gentoo.org/security/en/glsa/glsa-200503-02.xml
http://www.idefense.com/application/poi/display?id=205&type=vulnerabilities
Common Vulnerability Exposure (CVE) ID: CVE-2005-0259
CERT/CC vulnerability note: VU#774686
http://www.kb.cert.org/vuls/id/774686
http://www.idefense.com/application/poi/display?id=204&type=vulnerabilities
http://secunia.com/advisories/14362/
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.