Page 2 of 8 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

ExpressionEngine before 4.3.5 has reflected XSS. ExpressionEngine en versiones anteriores a la 4.3.5 tiene Cross-Site Scripting (XSS) reflejado. • https://docs.expressionengine.com/latest/about/changelog.html#version-4-3-5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 30EXPL: 4

Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php. Múltiples vulnerabilidades de inyección SQL en EllisLab ExpressionEngine anterior a 2.9.1 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro (1) column_filter o (2) category[] en system/index.php o el parámetro (3) tbl_sort[0][] en el módulo comment en system/index.php. EllisLab ExpressionEngine Core versions prior to 2.9.0 suffer from multiple authenticated remote SQL injection vulnerabilities. • http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html http://seclists.org/fulldisclosure/2014/Nov/2 http://www.securityfocus.com/bid/70875 https://ellislab.com/expressionengine/user-guide/about/changelog.html https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 3

Cross-site scripting (XSS) vulnerability in system/index.php in ExpressionEngine 1.6.4 through 1.6.6, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the avatar parameter. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en system/index.php in ExpressionEngine v1.6.4 a la v1.6.6 y posiblemente otras versiones anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro "avatar". • https://www.exploit-db.com/exploits/32871 http://expressionengine.com/docs/changelog.html#v167 http://secunia.com/advisories/34379 http://www.ngenuity.org/wordpress/2009/01/28/ngenuity-2009-003-expressionengine-persistent-cross-site-scripting http://www.securityfocus.com/archive/1/502045/100/0/threaded http://www.securityfocus.com/bid/34193 https://exchange.xforce.ibmcloud.com/vulnerabilities/49359 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •