Exponentcms

Exponent Cms

59 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.64%
  • Veröffentlicht 06.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique...

Exploit
  • EPSS 9.65%
  • Veröffentlicht 23.01.2017 21:59:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.

  • EPSS 0.24%
  • Veröffentlicht 18.01.2017 17:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exponent CMS before 2.3.7 does not properly restrict the types of files that can be uploaded, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly have other unspecified impact as demonstrated by uploading a file w...

  • EPSS 0.23%
  • Veröffentlicht 18.01.2017 17:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Cross-site scripting (XSS) vulnerability in Reset Your Password module in Exponent CMS before 2.3.5 allows remote attackers to inject arbitrary web script or HTML via the Username/Email.

Exploit
  • EPSS 3.3%
  • Veröffentlicht 12.01.2017 22:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload an evil 'exploit.tar.gz' file to the website, then extract it by visiting '/install/index.php?install_sample=../../files/exploit', whi...

Exploit
  • EPSS 3.3%
  • Veröffentlicht 12.01.2017 22:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Exponent CMS 2.3.9 suffers from a remote code execution vulnerability in /install/index.php. An attacker can upload 'php' file to the website through uploader_paste.php, then overwrite /framework/conf/config.php, which leads to arbitrary code executi...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 29.11.2016 23:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In framework/modules/core/controllers/expCommentController.php of Exponent CMS 2.4.0, content_id input is passed into showComments. The method showComments is defined in the expCommentControllercontroller with the parameter '$this->params['content_id...

  • EPSS 0.53%
  • Veröffentlicht 15.11.2016 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In /framework/modules/notfound/controllers/notfoundController.php of Exponent CMS 2.4.0 patch1, untrusted input is passed into getSearchResults. The method getSearchResults is defined in the search model with the parameter '$term' used directly in SQ...

  • EPSS 0.25%
  • Veröffentlicht 11.11.2016 23:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used lik...

  • EPSS 0.21%
  • Veröffentlicht 11.11.2016 22:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0patch1 does not properly restrict access to user records, which allows remote attackers to read address information, as demonstrated by an address/show/id/1 URI.