Vulnerabilities > E107 > High

DATE CVE VULNERABILITY TITLE RISK
2008-10-29 CVE-2008-4785 SQL Injection vulnerability in E107 Alternate Profiles Plugin 0.2
SQL injection vulnerability in newuser.php in the alternate_profiles plugin, possibly 0.2, for e107 allows remote attackers to execute arbitrary SQL commands via the id parameter.
network
low complexity
e107 CWE-89
7.5
2008-04-30 CVE-2008-2020 Use of Insufficiently Random Values vulnerability in multiple products
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings.
7.5
2006-11-07 CVE-2006-5786 Local File Include vulnerability in E107 0.7.5
Directory traversal vulnerability in class2.php in e107 0.7.5 and earlier allows remote attackers to read and execute PHP code in arbitrary files via ".." sequences in the e107language_e107cookie cookie to gsitemap.php.
network
low complexity
e107
7.5
2006-09-06 CVE-2006-4548 Remote Security vulnerability in e107
e107 0.75 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary PHP code via the tinyMCE_imglib_include image/jpeg parameter in e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php, as demonstrated by a multipart/form-data request.
network
low complexity
e107
7.5
2005-12-14 CVE-2005-4224 SQL-Injection vulnerability in E107 0.7
Multiple "potential" SQL injection vulnerabilities in e107 0.7 might allow remote attackers to execute arbitrary SQL commands via (1) the email, hideemail, image, realname, signature, timezone, and xupexist parameters in signup.php, (2) the content_comment, content_rating, and content_summary parameters in subcontent.php, (3) the download_category and file_demo in upload.php, and (4) the email, hideemail, user_timezone, and user_xup parameters in usersettings.php.
network
low complexity
e107
7.5
2005-11-06 CVE-2005-3521 SQL Injection vulnerability in E107 0.617/0.6171/0.6172
SQL injection vulnerability in resetcore.php in e107 0.617 through 0.6173 allows remote attackers to execute arbitrary SQL commands, bypass authentication, and inject HTML or script via the (1) a_name parameter or (2) user field of the login page.
network
low complexity
e107
7.5
2005-06-10 CVE-2005-1966 Remote Command Execution vulnerability in E107 1.0.1
The eTrace_validaddr function in eTrace plugin for e107 portal allows remote attackers to execute arbitrary commands via shell metacharacters after a valid argument to the etrace_host parameter.
network
low complexity
e107
7.5
2004-05-29 CVE-2004-2042 Multiple vulnerability in E107 0.615/0.615A
Multiple SQL injection vulnerabilities in e107 0.615 allow remote attackers to inject arbitrary SQL code and gain sensitive information via (1) content parameter to content.php, (2) content_id parameter to content.php, or (3) list parameter to news.php.
network
low complexity
e107
7.5
2004-05-29 CVE-2004-2041 Multiple vulnerability in e107 Website System
PHP remote file inclusion vulnerability in secure_img_render.php in e107 0.615 allows remote attackers to execute arbitrary PHP code by modifying the p parameter to reference a URL on a remote web server that contains the code.
network
low complexity
e107
7.5