Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown
CVE-2024-38454
Disclosure Date: June 16, 2024 (last updated July 27, 2024)
ExpressionEngine before 7.4.11 allows XSS.
0
Attacker Value
Unknown
CVE-2021-44534
Disclosure Date: May 31, 2024 (last updated June 01, 2024)
Insufficient user input filtering leads to arbitrary file read by non-authenticated attacker, which results in sensitive information disclosure.
0
Attacker Value
Unknown
CVE-2023-22953
Disclosure Date: February 09, 2023 (last updated October 08, 2023)
In ExpressionEngine before 7.2.6, remote code execution can be achieved by an authenticated Control Panel user.
0
Attacker Value
Unknown
CVE-2020-8242
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
Unsanitized user input in ExpressionEngine <= 5.4.0 control panel member creation leads to an SQL injection. The user needs member creation/admin control panel access to execute the attack.
0
Attacker Value
Unknown
CVE-2021-33199
Disclosure Date: August 12, 2021 (last updated February 23, 2025)
In Expression Engine before 6.0.3, addonIcon in Addons/file/mod.file.php relies on the untrusted input value of input->get('file') instead of the fixed file names of icon.png and icon.svg.
0
Attacker Value
Unknown
CVE-2021-27230
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
0
Attacker Value
Unknown
CVE-2020-13443
Disclosure Date: June 24, 2020 (last updated February 21, 2025)
ExpressionEngine before 5.3.2 allows remote attackers to upload and execute arbitrary code in a .php%20 file via Compose Msg, Add attachment, and Save As Draft actions. A user with low privileges (member) is able to upload this. It is possible to bypass the MIME type check and file-extension check while uploading new files. Short aliases are not used for an attachment; instead, direct access is allowed to the uploaded files. It is possible to upload PHP only if one has member access, or registration/forum is enabled and one can create a member with the default group id of 5. To exploit this, one must to be able to send and compose messages (at least).
0
Attacker Value
Unknown
CVE-2018-17874
Disclosure Date: October 01, 2018 (last updated November 27, 2024)
ExpressionEngine before 4.3.5 has reflected XSS.
0
Attacker Value
Unknown
CVE-2017-1000160
Disclosure Date: November 17, 2017 (last updated November 26, 2024)
EllisLab ExpressionEngine 3.4.2 is vulnerable to cross-site scripting resulting in PHP code injection
0
Attacker Value
Unknown
CVE-2017-0897
Disclosure Date: June 22, 2017 (last updated November 26, 2024)
ExpressionEngine version 2.x < 2.11.8 and version 3.x < 3.5.5 create an object signing token with weak entropy. Successfully guessing the token can lead to remote code execution.
0