Efiction Project : Security Vulnerabilities, CVEs,
eFiction 1.0, 1.1, and 2.0 allows remote attackers to obtain sensitive information by accessing phpinfo.php, which executes the PHP phpinfo function.
Max CVSS
5.0
EPSS Score
0.49%
Published
2005-12-11
Updated
2008-09-05
eFiction 1.0, 1.1, and 2.0 allows remote attackers to obtain sensitive information via a direct request to storyblock.php without arguments, which leaks the full pathname in the resulting PHP error message.
Max CVSS
5.0
EPSS Score
0.49%
Published
2005-12-11
Updated
2008-09-05
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
Max CVSS
7.5
EPSS Score
21.03%
Published
2005-12-11
Updated
2008-09-05
SQL injection vulnerability in eFiction 1.1 allows remote attackers to execute arbitrary SQL commands via the uid parameter to viewuser.php.
Max CVSS
7.5
EPSS Score
3.72%
Published
2005-12-11
Updated
2017-07-20
Multiple SQL injection vulnerabilities in eFiction 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) let parameter in a viewlist action to authors.php and (2) sid parameter to viewstory.php.
Max CVSS
7.5
EPSS Score
1.18%
Published
2005-12-11
Updated
2017-07-20
Multiple SQL injection vulnerabilities in eFiction 1.0, 1.1, and 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the let parameter in a viewlist action to titles.php and (2) the username.
Max CVSS
7.5
EPSS Score
1.48%
Published
2005-12-11
Updated
2008-09-05
Cross-site scripting (XSS) vulnerability in eFiction 1.0 and 1.1 allows remote attackers to inject arbitrary web script or HTML via the let parameter in a viewlist action to titles.php.
Max CVSS
4.3
EPSS Score
0.40%
Published
2005-12-11
Updated
2008-09-05
7 vulnerabilities found