what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

MOPS-2010-035 - e107 BBCode PHP Code Execution
Posted May 25, 2010
Authored by Stefan Esser | Site php-security.org

Month Of PHP Security - It was discovered that access control to the [php] bbcode which allows executing PHP code is wrongly implemented in e107. This allows unauthenticated users to execute arbitrary PHP code easily. e107 versions 0.7.20 and below are affected.

tags | exploit, arbitrary, php
SHA-256 | 9e5e13070e5b1bbb208fabf81b566739464738bffb9c5bb3ff0a0421519c348e

Related Files

e107 Articulate 1.1.1 Shell Upload
Posted Jun 23, 2012
Authored by Sammy FORGIT

e107 Articulate third party module version 1.1.1 suffers from an unauthenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 41b99ecb1b11992f69a368336dd53421e432b6e6aac49f238f066819b66025b8
Secunia Security Advisory 49591
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsi Fancybox plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6cfc82c0fad5255ca4a775def21abbb0284c94f969f78bb4c9e74c278071bb04
Secunia Security Advisory 49589
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Image Gallery plugin for e107, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 8844044c709b6aa30cceecfcf055bfab2dc631c21079f4dfb392028bb40b5fbc
Secunia Security Advisory 49583
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsi Share plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8e5af64f12f009a6bc1b98e4e9576c9bfcec55804ea4f0c0eda69328d00cb3b2
Secunia Security Advisory 49585
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Radio Plan plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 367b1b05199a61222994c7aa0e728fb0b7facdec1917b462518370074fd70c36
Secunia Security Advisory 49584
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsis Media Gallery plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0f534606c652b216373d194d699760fa24a172649e214b3231608827d0479546
e107 Tap 2.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Tap plugin version 2.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 16d450b6820569c25505641914654435ddd38724cabde859aebdd200c217525b
e107 Radio Plan 2.06 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Radio Plan plugin version 2.06 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 5220d8a9f509f1a911a75ce3797603c70b92f27bd86d8e23024038f88f0290ca
e107 Hupsi Share 1.00 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Share plugin version 1.00 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 01edcafd988a763a0655922e61b5d35515bc3ba601616b9aca3fb8f4ed687449
e107 Image Gallery 0.9.7.1 File Disclosure
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Image Gallery plugin version 0.9.7.1 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 1f7d952a66337a9793777b6c5584a8fced88cabd97560d6834e5f3fd3fb3029e
e107 Hupsi Media Gallery 1.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Media Gallery plugin version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | cf798872e71c9fa0094aa28aab7cb5fe4bb92f07513ffad6e92a20748e2682d9
e107 Hupsi Fancybox 1.0.4 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Fancybox plugin version 1.0.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 727a4c7d0667d51fdc6d9063229dfbd1e7e1bb30b5ff957fb971eb33023c1113
e107 Filemanager 1.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Filemanager plugin version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1d93b23a1ed5130b4f2f0502a0ad4874fa5922b73334e7298c15b985733e50fe
e107 FileDownload 1.1 Shell Upload / File Disclosure
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 FileDownload plugin version 1.1 suffers from shell upload and file disclosure vulnerabilities.

tags | exploit, shell, vulnerability, info disclosure
SHA-256 | 4c9eeefd5a414c20c21f82970080248e3086771b1fd32ec3268620ead5403a56
e107 Cross Site Scripting
Posted Apr 26, 2012
Authored by HauntIT

e107 suffers from a cross site scripting vulnerability in the registration page.

tags | exploit, xss
SHA-256 | 711a1942ca5606e2c2803b63fcc66ee6109cee7ab973f852fe41a6812590e6ed
E107 1.0.0 Flexicontent SQL Injection
Posted Mar 30, 2012
Authored by Am!r | Site irist.ir

The Flexicontent component in E107 version 1.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 415819e480c87949196e8660c90b6a6e0bf85fc7176806049bb428ec4a657981
Secunia Security Advisory 46706
Posted Dec 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mghack has discovered multiple vulnerabilities in e107, which can be exploited by malicious users to conduct script insertion and SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | c482e45f6fdd9faa612e29b97ed32928d834721b371e24055f9a2ebf57296b54
jbShop SQL Injection
Posted Oct 31, 2011
Authored by Robert Cooper

The jbShop e107 CMS plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c0aff325677050d5fa03cbcb44ff7ed0d4e714a4e227985f64f00e822428c3f0
Core Security Technologies Advisory 2011.0810
Posted Oct 24, 2011
Authored by Core Security Technologies, Matthew Bergin, Matias Blanco | Site coresecurity.com

Core Security Technologies Advisory - When the install script for e107 CMS has not been removed, an attacker can "reinstall" the application using arbitrary parameters. If the attacker puts a valid MySql server followed a semicolon and PHP code, this will be executed when the config file gets requested. This parameters are stored in the config file "e107_config.php". Version 0.7.24 is affected.

tags | exploit, arbitrary, php
advisories | CVE-2011-1513
SHA-256 | f1aa6364a9b7aec87affa0e57cc0ec5d09d69d9a12a32fe5e884c8288d964039
Pranian Group e107 Cross Site Scripting
Posted Sep 4, 2011
Authored by Ehsan_Hp200

Sites by Pranian Group e107 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 680173c283307c88ebbba71e37e334f42cdc43c16d2af28997adac77fc40f59a
e107 0.7.25 Cross Site Scripting / SQL Injection
Posted Jun 18, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

e107 version 0.7.25 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 508e2264de222779d99c876535fa46cd425719bf284a3b07ccab07ccbe1fd70d
Secunia Security Advisory 44968
Posted Jun 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in e107, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6d185a8b7325a6e13da628f62531b50827d7cf3b20e8a97c75cb335faec2cf8b
e107 0.7.25_full Blind SQL Injection
Posted May 7, 2011
Authored by KedAns-Dz

e107 version 0.7.25_full suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 565bc858f68b00d983477864c5e7d9ecd2b132beb2a8124f1dc53dbf30e06c17
e107 0.7.25_full Cross Site Scripting / Remote File Inclusion
Posted Apr 19, 2011
Authored by KedAns-Dz

e107 version 0.7.25_full suffers from cross site scripting and remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, file inclusion
SHA-256 | a1009de0e9d35d4684ddf711c669b7f6adc01cfdf2acabcd1c1311d4efad15bb
Secunia Security Advisory 44061
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Autosec Tools has discovered a vulnerability in e107, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | b9709751ccc86dcf65cf0a4f0cecb882db9a6c34230293c065236fe573d8b0e0
Page 1 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close