CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
96103 | CVE-2016-9283 | Candidate | SQL Injection in framework/core/subsystems/expRouter.php in Exponent CMS v2.4.0 allows remote attackers to read database information via address/addContentToSearch/id/ and a trailing string, related to a "sef URL" issue. | Assigned (20161111) | None (candidate not yet proposed) | View | |
96104 | CVE-2016-9284 | Candidate | getUsersByJSON in framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via users/getUsersByJSON/sort/ and a trailing string. | Assigned (20161111) | None (candidate not yet proposed) | View | |
96105 | CVE-2016-9285 | Candidate | framework/modules/addressbook/controllers/addressController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via a modified id number, as demonstrated by address/edit/id/1, related to an "addresses, countries, and regions" issue. | Assigned (20161111) | None (candidate not yet proposed) | View | |
96106 | CVE-2016-9286 | Candidate | framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0patch1 does not properly restrict access to user records, which allows remote attackers to read address information, as demonstrated by an address/show/id/1 URI. | Assigned (20161111) | None (candidate not yet proposed) | View | |
96107 | CVE-2016-9287 | Candidate | In /framework/modules/notfound/controllers/notfoundController.php of Exponent CMS 2.4.0 patch1, untrusted input is passed into getSearchResults. The method getSearchResults is defined in the search model with the parameter "$term" used directly in SQL. Impact is a SQL injection. | Assigned (20161111) | None (candidate not yet proposed) | View |
Page 18614 of 20943, showing 5 records out of 104715 total, starting on record 93066, ending on 93070