Filtered by vendor E107
Subscriptions
Filtered by product E107
Subscriptions
Total
82 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-2039 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
e107 0.615 allows remote attackers to obtain sensitive information via a direct request to (1) alt_news.php, (2) backend_menu.php, (3) clock_menu.php, (4) counter_menu.php, (5) login_menu.php, and other files, which reveal the full path in a PHP error message. | ||||
CVE-2004-2031 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in user.php in e107 allows remote attackers to inject arbitrary web script or HTML via the (1) URL, (2) MSN, or (3) AIM fields. | ||||
CVE-2006-4757 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Multiple SQL injection vulnerabilities in the admin section in e107 0.7.5 allow remote authenticated administrative users to execute arbitrary SQL commands via the (1) linkopentype, (2) linkrender, (3) link_class, and (4) link_id parameters in (a) links.php; the (5) searchquery parameter in (b) users.php; and the (6) download_category_class parameter in (c) download.php. NOTE: an e107 developer has disputed the significance of the vulnerability, stating that "If your admins are injecting you, you might want to reconsider their access." | ||||
CVE-2006-4794 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in e107 0.7.5 allow remote attackers to inject arbitrary web script or HTML via the query string (PATH_INFO) in (1) contact.php, (2) download.php, (3) admin.php, (4) fpw.php, (5) news.php, (6) search.php, (7) signup.php, (8) submitnews.php, and (9) user.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | ||||
CVE-2004-2028 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Cross-site scripting (XSS) vulnerability in stats.php in e107 allows remote attackers to inject arbitrary web script or HTML via the referer parameter to log.php. | ||||
CVE-2005-4224 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Multiple "potential" SQL injection vulnerabilities in e107 0.7 might allow remote attackers to execute arbitrary SQL commands via (1) the email, hideemail, image, realname, signature, timezone, and xupexist parameters in signup.php, (2) the content_comment, content_rating, and content_summary parameters in subcontent.php, (3) the download_category and file_demo in upload.php, and (4) the email, hideemail, user_timezone, and user_xup parameters in usersettings.php. | ||||
CVE-2004-2040 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary web script or HTML via the (1) LAN_407 parameter to clock_menu.php, (2) "email article to a friend" field, (3) "submit news" field, or (4) avmsg parameter to usersettings.php. | ||||
CVE-2005-2559 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function. | ||||
CVE-2003-1191 | 1 E107 | 1 E107 | 2025-04-03 | N/A |
chatbox.php in e107 0.554 and 0.603 allows remote attackers to cause a denial of service (pages fail to load) via HTML in the Name field, which prevents the main.php form from being loaded. | ||||
CVE-2023-36121 | 1 E107 | 1 E107 | 2024-11-21 | 5.4 Medium |
Cross Site Scripting vulnerability in e107 v.2.3.2 allows a remote attacker to execute arbitrary code via the description function in the SEO project. | ||||
CVE-2021-27885 | 1 E107 | 1 E107 | 2024-11-21 | 8.8 High |
usersettings.php in e107 through 2.3.0 lacks a certain e_TOKEN protection mechanism. | ||||
CVE-2018-17423 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
An issue was discovered in e107 v2.1.9. There is a XSS attack on e107_admin/comment.php. | ||||
CVE-2018-17081 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used=1&id= for changing the title of an arbitrary page. | ||||
CVE-2018-16389 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107_admin/banlist.php in e107 2.1.8 allows SQL injection via the old_ip parameter. | ||||
CVE-2018-16388 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type. | ||||
CVE-2018-16381 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107 2.1.8 has XSS via the e107_admin/users.php?mode=main&action=list user_loginname parameter. | ||||
CVE-2018-15901 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107 2.1.8 has CSRF in 'usersettings.php' with an impact of changing details such as passwords of users including administrators. | ||||
CVE-2018-11734 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
In e107 v2.1.7, output without filtering results in XSS. | ||||
CVE-2018-11127 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107 2.1.7 has CSRF resulting in arbitrary user deletion. | ||||
CVE-2017-8098 | 1 E107 | 1 E107 | 2024-11-21 | N/A |
e107 2.1.4 is vulnerable to cross-site request forgery in plugin-installing, meta-changing, and settings-changing. A malicious web page can use forged requests to make e107 download and install a plug-in provided by the attacker. |