index.php CuteNews 1.4.0 and earlier allows remote attackers to obtain the path of the installation path of the application by triggering an error message, such as by entering multiple ../ (dot dot slash) in the archive parameter.
Max CVSS
5.0
EPSS Score
0.50%
Published
2005-11-16
Updated
2016-10-18
Directory traversal vulnerability in CuteNews 1.4.1 allows remote attackers to include arbitrary files, execute code, and gain privileges via "../" sequences in the template parameter to (1) show_archives.php and (2) show_news.php.
Max CVSS
5.0
EPSS Score
6.85%
Published
2005-11-06
Updated
2011-03-08
Direct static code injection vulnerability in the flood protection feature in inc/shows.inc.php in CuteNews 1.4.0 and earlier allows remote attackers to execute arbitrary PHP code via the HTTP_CLIENT_IP header (Client-Ip), which is injected into data/flood.db.php.
Max CVSS
7.5
EPSS Score
2.95%
Published
2005-09-21
Updated
2008-09-05
Cross-site scripting (XSS) vulnerability in CuteNews allows remote attackers to inject arbitrary web script or HTML via the mod parameter to index.php.
Max CVSS
4.3
EPSS Score
0.26%
Published
2005-09-21
Updated
2018-10-19
show_news.php in CuteNews 1.3.6 allows remote attackers to obtain the full path of the server via an invalid archive parameter.
Max CVSS
5.0
EPSS Score
0.39%
Published
2005-07-27
Updated
2008-09-05
Cross-site scripting (XSS) vulnerability in CuteNews 1.3.6 allows remote attackers to inject arbitrary web script or HTML via (1) the lastusername parameter to index.php or (2) selected_search_arch parameter to search.php.
Max CVSS
4.3
EPSS Score
0.19%
Published
2005-07-27
Updated
2008-09-05
Direct code injection vulnerability in CuteNews 1.3.6 and earlier allows remote attackers with administrative privileges to execute arbitrary PHP code via certain inputs that are injected into a template (.tpl) file.
Max CVSS
4.4
EPSS Score
0.23%
Published
2005-06-09
Updated
2024-02-13
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!