Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2010-4757
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Cross-site scripting (XSS) vulnerability in submitnews.php in e107 before 0.7.23 allows remote attackers to inject arbitrary web script or HTML via the submitnews_title parameter, a different vector than CVE-2008-6208. NOTE: some of these details are obtained from third party information. NOTE: this might be the same as CVE-2009-4083.1 or CVE-2011-0457..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://e107.org/comment.php?comment.news.872
- http://e107.org/svn_changelog.php?version=0.7.23
- http://e107.svn.sourceforge.net/viewvc/e107/trunk/e107_0.7/e107_admin/newspost.php?r1=11
- http://securitytracker.com/id?1024351
- http://www.madirish.net/?article=471
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61331