Page 5 of 25 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in e107 allows remote attackers to inject arbitrary script or HTML via the "login name/author" field in the (1) news submit or (2) article submit functions. • http://secunia.com/advisories/11567 http://securitytracker.com/id?1010084 http://www.osvdb.org/5982 http://www.securityfocus.com/bid/10293 https://exchange.xforce.ibmcloud.com/vulnerabilities/16087 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php. • https://www.exploit-db.com/exploits/704 http://e107.org/comment.php?comment.news.672 http://secunia.com/advisories/13657 http://securitytracker.com/id?1012657 http://www.osvdb.org/12586 http://www.securityfocus.com/bid/12111 https://exchange.xforce.ibmcloud.com/vulnerabilities/18670 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.3EPSS: 1%CPEs: 11EXPL: 2

Cross-site scripting (XSS) vulnerability in user.php in e107 allows remote attackers to inject arbitrary web script or HTML via the (1) URL, (2) MSN, or (3) AIM fields. • http://marc.info/?l=bugtraq&m=108541119526279&w=2 http://secunia.com/advisories/11696 http://www.osvdb.org/6410 http://www.securityfocus.com/bid/10405 https://exchange.xforce.ibmcloud.com/vulnerabilities/16241 •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 1

Cross-site scripting (XSS) vulnerability in stats.php in e107 allows remote attackers to inject arbitrary web script or HTML via the referer parameter to log.php. • https://www.exploit-db.com/exploits/24138 http://marc.info/?l=bugtraq&m=108515632622796&w=2 http://secunia.com/advisories/11693 http://www.osvdb.org/6345 http://www.securityfocus.com/bid/10395 https://exchange.xforce.ibmcloud.com/vulnerabilities/16231 •

CVSS: 5.0EPSS: 5%CPEs: 2EXPL: 4

chatbox.php in e107 0.554 and 0.603 allows remote attackers to cause a denial of service (pages fail to load) via HTML in the Name field, which prevents the main.php form from being loaded. • https://www.exploit-db.com/exploits/23311 http://archives.neohapsis.com/archives/bugtraq/2003-10/0313.html http://secunia.com/advisories/10115 http://www.hackingheaven.com/index.php?name=PNphpBB2&file=viewtopic&t=21 http://www.osvdb.org/2753 http://www.securityfocus.com/bid/8930 https://exchange.xforce.ibmcloud.com/vulnerabilities/13553 •