CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

E107 : Security Vulnerabilities Published In 2005

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2005-4224 Exec Code Sql 2005-12-14 2018-10-19
7.5
None Remote Low Not required Partial Partial Partial
Multiple "potential" SQL injection vulnerabilities in e107 0.7 might allow remote attackers to execute arbitrary SQL commands via (1) the email, hideemail, image, realname, signature, timezone, and xupexist parameters in signup.php, (2) the content_comment, content_rating, and content_summary parameters in subcontent.php, (3) the download_category and file_demo in upload.php, and (4) the email, hideemail, user_timezone, and user_xup parameters in usersettings.php.
2 CVE-2005-4052 2005-12-07 2018-10-19
5.0
None Remote Low Not required None Partial None
e107 0.6174 allows remote attackers to redirect users to other web sites via the download parameter in rate.php, which is used after a user submits a file download rating. NOTE: in the default installation, the e_BASE variable restricts the redirection to the same web site.
3 CVE-2005-4051 2005-12-07 2018-10-19
5.0
None Remote Low Not required None Partial None
e107 0.6174 allows remote attackers to vote multiple times for a download via repeated requests to rate.php.
4 CVE-2005-3594 2005-11-16 2016-10-18
5.0
None Remote Low Not required None Partial None
game_score.php in e107 allows remote attackers to insert high scores via HTTP POST methods utilizing the $player_name, $player_score, and $game_name variables.
5 CVE-2005-3521 Exec Code Sql Bypass 2005-11-06 2017-07-11
7.5
None Remote Low Not required Partial Partial Partial
SQL injection vulnerability in resetcore.php in e107 0.617 through 0.6173 allows remote attackers to execute arbitrary SQL commands, bypass authentication, and inject HTML or script via the (1) a_name parameter or (2) user field of the login page.
6 CVE-2005-2805 2005-09-06 2017-07-11
5.0
None Remote Low Not required None Partial None
forum_post.php in e107 0.6 allows remote attackers to post to non-existent forums by modifying the forum number.
7 CVE-2005-2559 Exec Code 2005-08-16 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function.
8 CVE-2005-2327 XSS 2005-07-20 2017-10-19
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in e107 0.617 and earlier allows remote attackers to inject arbitrary web script or HTML via nested [url] BBCode tags.
9 CVE-2005-1966 Exec Code 2005-06-10 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
The eTrace_validaddr function in eTrace plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the etrace_host parameter.
10 CVE-2005-1949 Exec Code 2005-06-16 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
The eping_validaddr function in functions.php for the ePing plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the eping_host parameter.
Total number of vulnerabilities : 10   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.