Lucene search

K

Exponent Cms Security Vulnerabilities

cve
cve

CVE-2016-9184

In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact...

7.5CVSS

8.1AI Score

0.001EPSS

2016-11-04 10:59 AM
18
cve
cve

CVE-2016-9242

Multiple SQL injection vulnerabilities in the update method in framework/modules/core/controllers/expRatingController.php in Exponent CMS 2.4.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) content_type or (2) subtype parameter.

8.8CVSS

9.4AI Score

0.001EPSS

2016-11-07 11:59 AM
13
4
cve
cve

CVE-2016-9272

A Blind SQL Injection Vulnerability in Exponent CMS through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.

9.1CVSS

9.1AI Score

0.002EPSS

2016-11-11 11:59 AM
17
4
cve
cve

CVE-2016-9282

SQL Injection in framework/modules/search/controllers/searchController.php in Exponent CMS v2.4.0 allows remote attackers to read database information via action=search&module=search with the search_string parameter.

7.5CVSS

8.2AI Score

0.001EPSS

2016-11-11 10:59 PM
17
4
cve
cve

CVE-2016-9283

SQL Injection in framework/core/subsystems/expRouter.php in Exponent CMS v2.4.0 allows remote attackers to read database information via address/addContentToSearch/id/ and a trailing string, related to a "sef URL" issue.

7.5CVSS

8.2AI Score

0.001EPSS

2016-11-11 10:59 PM
23
4
cve
cve

CVE-2016-9284

getUsersByJSON in framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via users/getUsersByJSON/sort/ and a trailing string.

5.3CVSS

6AI Score

0.002EPSS

2016-11-11 10:59 PM
13
4
cve
cve

CVE-2016-9285

framework/modules/addressbook/controllers/addressController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via a modified id number, as demonstrated by address/edit/id/1, related to an "addresses, countries, and regions" issue.

5.3CVSS

6AI Score

0.002EPSS

2016-11-11 10:59 PM
14
4
cve
cve

CVE-2016-9286

framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0patch1 does not properly restrict access to user records, which allows remote attackers to read address information, as demonstrated by an address/show/id/1 URI.

5.3CVSS

5.2AI Score

0.002EPSS

2016-11-11 10:59 PM
20
4
cve
cve

CVE-2016-9287

In /framework/modules/notfound/controllers/notfoundController.php of Exponent CMS 2.4.0 patch1, untrusted input is passed into getSearchResults. The method getSearchResults is defined in the search model with the parameter '$term' used directly in SQL. Impact is a SQL injection.

9.8CVSS

9.7AI Score

0.002EPSS

2016-11-15 11:59 AM
18
cve
cve

CVE-2016-9288

In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.

9.8CVSS

9.8AI Score

0.002EPSS

2016-11-11 11:59 PM
17
4
cve
cve

CVE-2016-9481

In framework/modules/core/controllers/expCommentController.php of Exponent CMS 2.4.0, content_id input is passed into showComments. The method showComments is defined in the expCommentControllercontroller with the parameter '$this->params['content_id']' used directly in SQL. Impact is a SQL inje...

9.8CVSS

9.8AI Score

0.002EPSS

2016-11-29 11:59 PM
17
cve
cve

CVE-2017-18213

In Exponent CMS before 2.4.1 Patch #6, certain admin users can elevate their privileges.

7.2CVSS

7AI Score

0.001EPSS

2022-10-03 04:23 PM
21
cve
cve

CVE-2017-5879

An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability af...

9.8CVSS

9.7AI Score

0.002EPSS

2017-02-06 03:59 PM
23
cve
cve

CVE-2017-7991

Exponent CMS 2.4.1 and earlier has SQL injection via a base64 serialized API key (apikey parameter) in the api function of framework/modules/eaas/controllers/eaasController.php.

9.8CVSS

9.8AI Score

0.152EPSS

2017-04-22 01:59 AM
23
cve
cve

CVE-2017-8085

In Exponent CMS before 2.4.1 Patch #5, XSS in elFinder is possible in framework/modules/file/connector/elfinder.php.

6.1CVSS

5.9AI Score

0.001EPSS

2017-04-24 02:59 PM
25
cve
cve

CVE-2021-32441

SQL Injection vulnerability in Exponent-CMS v.2.6.0 fixed in 2.7.0 allows attackers to gain access to sensitive information via the selectValue function in the expConfig class.

7.5CVSS

7.9AI Score

0.001EPSS

2023-02-17 06:15 PM
14
cve
cve

CVE-2022-23047

Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site"

4.8CVSS

5.1AI Score

0.001EPSS

2022-02-09 11:15 PM
55
cve
cve

CVE-2022-23048

Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands.

7.2CVSS

7AI Score

0.002EPSS

2022-02-09 11:15 PM
101
cve
cve

CVE-2022-23049

Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.

5.4CVSS

5.4AI Score

0.001EPSS

2022-02-09 11:15 PM
81
Total number of security vulnerabilities69