Show filters
5,502 Total Results
Displaying 171-180 of 5,502
Sort by:
Attacker Value
Unknown
CVE-2024-8523
Disclosure Date: September 07, 2024 (last updated September 07, 2024)
A vulnerability was found in lmxcms up to 1.4 and classified as critical. Affected by this issue is the function formatData of the file /admin.php?m=Acquisi&a=testcj&lid=1 of the component SQL Command Execution Module. The manipulation of the argument data leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-44820
Disclosure Date: September 04, 2024 (last updated September 05, 2024)
A sensitive information disclosure vulnerability exists in ZZCMS v.2023 and before within the eginfo.php file located at /3/E_bak5.1/upload/. When accessed with the query parameter phome=ShowPHPInfo, the application executes the phpinfo() function, which exposes detailed information about the PHP environment, including server configuration, loaded modules, and environment variables.
0
Attacker Value
Unknown
CVE-2024-44819
Disclosure Date: September 04, 2024 (last updated September 06, 2024)
Cross Site Scripting vulnerability in ZZCMS v.2023 and before allows a remote attacker to obtain sensitive information via a crafted script to the pagename parameter of the admin/del.php component.
0
Attacker Value
Unknown
CVE-2024-44921
Disclosure Date: September 03, 2024 (last updated September 05, 2024)
SeaCMS v12.9 was discovered to contain a SQL injection vulnerability via the id parameter at /dmplayer/dmku/index.php?ac=del.
0
Attacker Value
Unknown
CVE-2024-44920
Disclosure Date: September 03, 2024 (last updated September 05, 2024)
A cross-site scripting (XSS) vulnerability in the component admin_collect_news.php of SeaCMS v12.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the siteurl parameter.
0
Attacker Value
Unknown
CVE-2024-44684
Disclosure Date: August 30, 2024 (last updated September 05, 2024)
TpMeCMS 1.3.3.2 is vulnerable to Cross Site Scripting (XSS) in /h.php/page?ref=addtabs via the "Title," "Images," and "Content" fields.
0
Attacker Value
Unknown
CVE-2024-44683
Disclosure Date: August 30, 2024 (last updated September 05, 2024)
Seacms v13 is vulnerable to Cross Site Scripting (XSS) via admin-video.php.
0
Attacker Value
Unknown
CVE-2024-8335
Disclosure Date: August 30, 2024 (last updated September 20, 2024)
A vulnerability classified as critical has been found in OpenRapid RapidCMS up to 1.3.1. Affected is an unknown function of the file /resource/runlogon.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-8334
Disclosure Date: August 30, 2024 (last updated September 20, 2024)
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been rated as problematic. This issue affects the function LogHandler of the file middleware/log.go. The manipulation leads to improper output neutralization for logs. The attack may be initiated remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 2024c370e6c78b07b358c9d4257fa5d1be732c38. It is recommended to apply a patch to fix this issue.
0
Attacker Value
Unknown
CVE-2024-8332
Disclosure Date: August 30, 2024 (last updated September 04, 2024)
A vulnerability was found in master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f. It has been declared as critical. This vulnerability affects unknown code of the file /table/index. The manipulation leads to sql injection. The attack can be initiated remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is 146359646a5a90cb09156dbd0013b7df77f2aa6c. It is recommended to apply a patch to fix this issue.
0