Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2011-5177
Disclosure Date: September 20, 2012 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in admin/controller.php in eSyndiCat Pro 2.3.05 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to the admins (2) blocks, (3) articles, or (4) suggest-category; or (5) sort parameter to the search page.
0
Attacker Value
Unknown
CVE-2008-3299
Disclosure Date: July 25, 2008 (last updated October 04, 2023)
eSyndiCat 1.6 allows remote attackers to bypass authentication and gain administrative access by setting the admin_lng cookie value to 1. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2007-6543
Disclosure Date: December 28, 2007 (last updated October 04, 2023)
SQL injection vulnerability in suggest-link.php in eSyndiCat Link Exchange Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
0
Attacker Value
Unknown
CVE-2007-3811
Disclosure Date: July 17, 2007 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in eSyndiCat allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to news.php or (2) the name parameter to page.php.
0
Attacker Value
Unknown
CVE-2007-2785
Disclosure Date: May 21, 2007 (last updated October 04, 2023)
manage-admins.php in eSyndiCat Pro 1.x allows remote attackers to create additional administrative accounts, and have other unspecified impact, via modified username, new_pass, new_pass2, status, super, and certain other parameters in an add action.
0
Attacker Value
Unknown
CVE-2006-4923
Disclosure Date: September 21, 2006 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in search.php in eSyndiCat Portal System allows remote attackers to inject arbitrary web script or HTML via the what parameter.
0
Attacker Value
Unknown
CVE-2006-2578
Disclosure Date: May 24, 2006 (last updated October 04, 2023)
admin/cron.php in eSyndicat Directory 1.2, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include arbitrary files and possibly execute arbitrary PHP code via a null-terminated value in the path_to_config parameter.
0