Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2011-5177

Disclosure Date: September 20, 2012 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in admin/controller.php in eSyndiCat Pro 2.3.05 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to the admins (2) blocks, (3) articles, or (4) suggest-category; or (5) sort parameter to the search page.
0
Attacker Value
Unknown

CVE-2008-3299

Disclosure Date: July 25, 2008 (last updated October 04, 2023)
eSyndiCat 1.6 allows remote attackers to bypass authentication and gain administrative access by setting the admin_lng cookie value to 1. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown

CVE-2007-6543

Disclosure Date: December 28, 2007 (last updated October 04, 2023)
SQL injection vulnerability in suggest-link.php in eSyndiCat Link Exchange Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
0
Attacker Value
Unknown

CVE-2007-3811

Disclosure Date: July 17, 2007 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in eSyndiCat allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php or (2) the name parameter to page.php.
0
Attacker Value
Unknown

CVE-2007-2785

Disclosure Date: May 21, 2007 (last updated October 04, 2023)
manage-admins.php in eSyndiCat Pro 1.x allows remote attackers to create additional administrative accounts, and have other unspecified impact, via modified username, new_pass, new_pass2, status, super, and certain other parameters in an add action.
0
Attacker Value
Unknown

CVE-2006-4923

Disclosure Date: September 21, 2006 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in search.php in eSyndiCat Portal System allows remote attackers to inject arbitrary web script or HTML via the what parameter.
0
Attacker Value
Unknown

CVE-2006-2578

Disclosure Date: May 24, 2006 (last updated October 04, 2023)
admin/cron.php in eSyndicat Directory 1.2, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include arbitrary files and possibly execute arbitrary PHP code via a null-terminated value in the path_to_config parameter.
0