Vulnerabilities (CVE)

Filtered by vendor Ravenphpscripts Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2009-0674 1 Ravenphpscripts 1 Ravennuke 2024-02-04 6.0 MEDIUM N/A
images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.
CVE-2009-0677 1 Ravenphpscripts 1 Ravennuke 2024-02-04 6.5 MEDIUM N/A
avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.
CVE-2009-0679 1 Ravenphpscripts 1 Ravennuke 2024-02-04 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in the Your Account module in RavenNuke 2.30 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVE-2009-0672 1 Ravenphpscripts 1 Ravennuke 2024-02-04 6.5 MEDIUM N/A
SQL injection vulnerability in the Resend_Email module in Raven Web Services RavenNuke 2.30 allows remote authenticated administrators to execute arbitrary SQL commands via the user_prefix parameter to modules.php.
CVE-2009-0678 1 Ravenphpscripts 1 Ravennuke 2024-02-04 5.0 MEDIUM N/A
images/captcha.php in RavenNuke 2.30 allows remote attackers to obtain sensitive information via an aFonts array parameter value that does not correspond to a valid font file, which reveals the installation path in an error message.
CVE-2009-0673 1 Ravenphpscripts 1 Ravennuke 2024-02-04 6.5 MEDIUM N/A
Eval injection vulnerability in the Custom Fields feature in the Your Account module in Raven Web Services RavenNuke 2.30 allows remote authenticated administrators to execute arbitrary PHP code via the ID Field Name box in a yaCustomFields action to admin.php.