e107 content management system versions 0.617, 0.6171, 0.6172 resetcore.php utility SQL Injection, login bypass, remote code execution, and cross site scripting exploit.
4ca6f9a0dff81c384f644a6d180792da376a530181b5b35ff06c8f4bc10d5a0b
e2 Distr CMS version 2.8.5.3 appears to leave backups in a world accessible directory under the document root.
5433c74f920760e59a3889a4eb94f7621298cabe8eddf15f30585be24f026e98
e107 version 2.3.2 suffers from a cross site scripting vulnerability.
a6b456793e5bb9514494489b12e17a5e039c2a8073ea5fab19e598715d39fbd8
e107 CMS version 3.2.1 suffers from cross site scripting and arbitrary file upload vulnerabilities that can allow for a shell upload.
3ae8caceae21f93d20493507ca607ad9781c300dc643e858c7c2ac8aa48b23b5
e107 CMS version 2.3.0 authenticated remote shell upload exploit.
503caef30c7aa6c3437f98cfc0ba2025433c35ec41208ba247fce01ab84eb4a3
e107 CMS version 2.3.0 suffers from a cross site request forgery vulnerability.
2013ddfa8526bb4e33ae90cfcef37c362b7da19436c141db997f5e57104264f4
e107 CMS version 2.1.4 suffers from multiple cross site request forgery vulnerabilities.
a3dd0d8bafb4e81d20da7c0057ad67cea0e439e447cc7a4c3fdebae5ed5634c6
e107 versions 2.1.4 and below keyword remote blind SQL injection exploit.
214559933faeecb5ba4596529712f3f7d1c4bd7f12b672f78b843f83b25c2c90
e107 CMS version 2.1.2 suffers from a privilege escalation vulnerability.
73baba47c53c160ce7de24af40be1871e0c32ae23b42c9e50a5f1ec9f610bac5
E2 version 2844 suffers from a remote SQL injection vulnerability.
63913ddb814634966361c1f31d81e76051565a5ad0dff9f9eb82add59af7c65f
e107 version 2.0 alpha2 suffers from a reflective cross site scripting vulnerability.
56bd876fd3e9e58a94c3248fcca4128f67bd75df9310ba5fdddc5ae0a7a6879c
e107 version 1.0.1 suffers from a cross site request forgery vulnerability that results in arbitrary javascript execution.
1b51a69a54bac68f0bfc9e8db03bc8acc5a1cf1df0b09c6483ae7fc4ca94a525
e107 version 1.0.2 suffers from a cross site request forgery vulnerability that results in SQL injection.
581ae255e2a78865ce312d579dde5e9592d78b773c888719f63727ce4b07e219
e107 Tap plugin version 2.0 suffers from a remote shell upload vulnerability.
16d450b6820569c25505641914654435ddd38724cabde859aebdd200c217525b
e107 Radio Plan plugin version 2.06 suffers from a remote shell upload vulnerability.
5220d8a9f509f1a911a75ce3797603c70b92f27bd86d8e23024038f88f0290ca
e107 Hupsi Share plugin version 1.00 suffers from a remote shell upload vulnerability.
01edcafd988a763a0655922e61b5d35515bc3ba601616b9aca3fb8f4ed687449
e107 Image Gallery plugin version 0.9.7.1 suffers from a remote file disclosure vulnerability.
1f7d952a66337a9793777b6c5584a8fced88cabd97560d6834e5f3fd3fb3029e
e107 Hupsi Media Gallery plugin version 1.0 suffers from a remote shell upload vulnerability.
cf798872e71c9fa0094aa28aab7cb5fe4bb92f07513ffad6e92a20748e2682d9
e107 Hupsi Fancybox plugin version 1.0.4 suffers from a remote shell upload vulnerability.
727a4c7d0667d51fdc6d9063229dfbd1e7e1bb30b5ff957fb971eb33023c1113
e107 Filemanager plugin version 1.0 suffers from a remote shell upload vulnerability.
1d93b23a1ed5130b4f2f0502a0ad4874fa5922b73334e7298c15b985733e50fe
e107 FileDownload plugin version 1.1 suffers from shell upload and file disclosure vulnerabilities.
4c9eeefd5a414c20c21f82970080248e3086771b1fd32ec3268620ead5403a56
The Flexicontent component in E107 version 1.0.0 suffers from a remote SQL injection vulnerability.
415819e480c87949196e8660c90b6a6e0bf85fc7176806049bb428ec4a657981
e107 version 0.7.25 suffers from cross site scripting and remote SQL injection vulnerabilities.
508e2264de222779d99c876535fa46cd425719bf284a3b07ccab07ccbe1fd70d
e107 version 0.7.25_full suffers from a remote blind SQL injection vulnerability.
565bc858f68b00d983477864c5e7d9ecd2b132beb2a8124f1dc53dbf30e06c17
e107 version 0.7.25_full suffers from cross site scripting and remote file inclusion vulnerabilities.
a1009de0e9d35d4684ddf711c669b7f6adc01cfdf2acabcd1c1311d4efad15bb
A cross site request forgery vulnerability in e107 version 0.7.25 can be exploited to grant admin privileges.
63cb6ca823beffb1db021f387a72de0cdc5f339f33eb80b38b7c32801ec531fb