Total
82 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-2020 | 8 E107, Labgab, My123tkshop and 5 more | 8 E107, Labgab, E-commerce-suite and 5 more | 2024-02-14 | 6.8 MEDIUM | 7.5 HIGH |
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings. | |||||
CVE-2005-2559 | 1 E107 | 1 E107 | 2024-02-14 | 7.5 HIGH | N/A |
doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function. | |||||
CVE-2005-1949 | 1 E107 | 1 E107 | 2024-02-14 | 7.5 HIGH | N/A |
The eping_validaddr function in functions.php for the ePing plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the eping_host parameter. | |||||
CVE-2004-2262 | 1 E107 | 1 E107 | 2024-01-26 | 7.5 HIGH | N/A |
ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php. | |||||
CVE-2021-27885 | 1 E107 | 1 E107 | 2023-08-08 | 6.8 MEDIUM | 8.8 HIGH |
usersettings.php in e107 through 2.3.0 lacks a certain e_TOKEN protection mechanism. | |||||
CVE-2023-36121 | 1 E107 | 1 E107 | 2023-08-05 | N/A | 5.4 MEDIUM |
Cross Site Scripting vulnerability in e107 v.2.3.2 allows a remote attacker to execute arbitrary code via the description function in the SEO project. | |||||
CVE-2018-11734 | 1 E107 | 1 E107 | 2019-07-17 | 4.3 MEDIUM | 6.1 MEDIUM |
In e107 v2.1.7, output without filtering results in XSS. | |||||
CVE-2018-17423 | 1 E107 | 1 E107 | 2019-06-20 | 3.5 LOW | 4.8 MEDIUM |
An issue was discovered in e107 v2.1.9. There is a XSS attack on e107_admin/comment.php. | |||||
CVE-2016-10753 | 1 E107 | 1 E107 | 2019-05-29 | 6.5 MEDIUM | 8.8 HIGH |
e107 2.1.2 allows PHP Object Injection with resultant SQL injection, because usersettings.php uses unserialize without an HMAC. | |||||
CVE-2018-17081 | 1 E107 | 1 E107 | 2018-11-26 | 4.3 MEDIUM | 4.3 MEDIUM |
e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used=1&id= for changing the title of an arbitrary page. | |||||
CVE-2018-15901 | 1 E107 | 1 E107 | 2018-11-02 | 6.8 MEDIUM | 8.8 HIGH |
e107 2.1.8 has CSRF in 'usersettings.php' with an impact of changing details such as passwords of users including administrators. | |||||
CVE-2018-16388 | 1 E107 | 1 E107 | 2018-11-02 | 6.5 MEDIUM | 7.2 HIGH |
e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type. | |||||
CVE-2018-16389 | 1 E107 | 1 E107 | 2018-11-02 | 5.5 MEDIUM | 6.5 MEDIUM |
e107_admin/banlist.php in e107 2.1.8 allows SQL injection via the old_ip parameter. | |||||
CVE-2018-16381 | 1 E107 | 1 E107 | 2018-10-29 | 4.3 MEDIUM | 6.1 MEDIUM |
e107 2.1.8 has XSS via the e107_admin/users.php?mode=main&action=list user_loginname parameter. | |||||
CVE-2005-4224 | 1 E107 | 1 E107 | 2018-10-19 | 7.5 HIGH | N/A |
Multiple "potential" SQL injection vulnerabilities in e107 0.7 might allow remote attackers to execute arbitrary SQL commands via (1) the email, hideemail, image, realname, signature, timezone, and xupexist parameters in signup.php, (2) the content_comment, content_rating, and content_summary parameters in subcontent.php, (3) the download_category and file_demo in upload.php, and (4) the email, hideemail, user_timezone, and user_xup parameters in usersettings.php. | |||||
CVE-2005-4052 | 1 E107 | 1 E107 | 2018-10-19 | 5.0 MEDIUM | N/A |
e107 0.6174 allows remote attackers to redirect users to other web sites via the download parameter in rate.php, which is used after a user submits a file download rating. NOTE: in the default installation, the e_BASE variable restricts the redirection to the same web site. | |||||
CVE-2005-4051 | 1 E107 | 1 E107 | 2018-10-19 | 5.0 MEDIUM | N/A |
e107 0.6174 allows remote attackers to vote multiple times for a download via repeated requests to rate.php. | |||||
CVE-2006-3259 | 1 E107 | 1 E107 | 2018-10-18 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in e107 0.7.5 allow remote attackers to inject arbitrary web script or HTML via the (1) ep parameter to search.php and the (2) subject parameter in comment.php (aka the Subject field when posting a comment). | |||||
CVE-2006-2416 | 1 E107 | 1 E107 | 2018-10-18 | 5.1 MEDIUM | N/A |
SQL injection vulnerability in class2.php in e107 0.7.2 and earlier allows remote attackers to execute arbitrary SQL commands via a cookie as defined in $pref['cookie_name']. | |||||
CVE-2006-0857 | 1 E107 | 2 Chatbox Plugin, E107 | 2018-10-18 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in Chatbox Plugin 1.0 in e107 0.7.2 allows remote attackers to inject arbitrary HTML or web script via a Chatbox, as demonstrated using a SCRIPT element. |