Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
Max CVSS
10.0
EPSS Score
3.46%
Published
2017-01-23
Updated
2018-10-09
Exponent CMS before 2.3.9 is vulnerable to an attacker uploading a malicious script file using redirection to place the script in an unprotected folder, one allowing script execution.
Max CVSS
9.8
EPSS Score
0.61%
Published
2016-11-03
Updated
2018-02-27
Multiple SQL injection vulnerabilities in Exponent CMS before 2.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an activate_address address controller action, (2) title parameter in a show blog controller action, or (3) content_id parameter in a showComments expComment controller action.
Max CVSS
9.8
EPSS Score
0.52%
Published
2017-02-07
Updated
2018-02-27
Exponent CMS 2.3.0 through 2.3.9 allows remote attackers to have unspecified impact via vectors related to "uploading files to wrong location."
Max CVSS
9.8
EPSS Score
0.45%
Published
2018-03-07
Updated
2019-04-25
The Pixidou Image Editor in Exponent CMS prior to v2.3.9 patch 2 could be used to perform an fid SQL Injection.
Max CVSS
9.8
EPSS Score
0.20%
Published
2016-11-03
Updated
2016-12-02
install/index.php in Exponent CMS 2.3.9 allows remote attackers to execute arbitrary commands via shell metacharacters in the sc array parameter.
Max CVSS
9.8
EPSS Score
0.64%
Published
2017-02-13
Updated
2018-02-27
SQL injection vulnerability in cron/find_help.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the version parameter.
Max CVSS
9.8
EPSS Score
0.16%
Published
2017-03-07
Updated
2017-03-31
SQL injection vulnerability in framework/modules/blog/controllers/blogController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the author parameter.
Max CVSS
9.8
EPSS Score
0.16%
Published
2017-03-07
Updated
2017-03-31
SQL injection vulnerability in framework/core/models/expConfig.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the src parameter.
Max CVSS
9.8
EPSS Score
0.16%
Published
2017-03-07
Updated
2017-03-31
SQL injection vulnerability in framework/core/models/expRecord.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the title parameter.
Max CVSS
9.8
EPSS Score
0.16%
Published
2017-03-07
Updated
2017-03-31
SQL injection vulnerability in the getSection function in framework/core/subsystems/expRouter.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the section parameter.
Max CVSS
9.8
EPSS Score
0.28%
Published
2017-03-07
Updated
2017-07-28
SQL injection vulnerability in framework/modules/users/models/user.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
Max CVSS
9.8
EPSS Score
0.16%
Published
2017-03-07
Updated
2017-04-01
SQL injection vulnerability in framework/core/models/expConfig.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the apikey parameter.
Max CVSS
9.8
EPSS Score
0.21%
Published
2017-03-07
Updated
2017-04-01
Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload 'php' file to the website through uploader_paste.php, then overwrite /framework/conf/config.php, which leads to arbitrary code execution.
Max CVSS
9.8
EPSS Score
1.21%
Published
2017-01-12
Updated
2017-01-13
Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload an evil 'exploit.tar.gz' file to the website, then extract it by visiting '/install/index.php?install_sample=../../files/exploit', which leads to arbitrary code execution.
Max CVSS
9.8
EPSS Score
1.21%
Published
2017-01-12
Updated
2017-01-13
Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/help/controllers/helpController.php.
Max CVSS
9.8
EPSS Score
0.21%
Published
2019-05-23
Updated
2019-05-24
Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/ecommerce/controllers/cartController.php.
Max CVSS
9.8
EPSS Score
0.21%
Published
2019-05-24
Updated
2019-05-28
Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expCatController.php related to change_cats.
Max CVSS
9.8
EPSS Score
0.49%
Published
2019-05-23
Updated
2019-05-24
Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expTagController.php related to change_tags.
Max CVSS
9.8
EPSS Score
0.49%
Published
2019-05-24
Updated
2019-05-28
SQL injection vulnerability in the activate_address function in framework/modules/addressbook/controllers/addressController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the is_what parameter.
Max CVSS
9.8
EPSS Score
0.20%
Published
2017-03-07
Updated
2017-04-01
SQL injection vulnerability in framework/modules/help/controllers/helpController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the version parameter.
Max CVSS
9.8
EPSS Score
0.20%
Published
2017-03-07
Updated
2017-04-04
Exponent CMS before 2.6.0 has improper input validation in storeController.php.
Max CVSS
9.8
EPSS Score
0.23%
Published
2020-12-31
Updated
2021-01-04
Exponent CMS before 2.6.0 has improper input validation in usersController.php.
Max CVSS
9.8
EPSS Score
0.23%
Published
2020-12-31
Updated
2021-01-04
Exponent CMS before 2.6.0 has improper input validation in cron/find_help.php.
Max CVSS
9.8
EPSS Score
0.23%
Published
2020-12-31
Updated
2021-01-04
Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php.
Max CVSS
9.8
EPSS Score
0.23%
Published
2020-12-31
Updated
2021-01-04
59 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!