Show filters
102 Total Results
Displaying 61-70 of 102
Sort by:
Attacker Value
Unknown

CVE-2018-19053

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
PbootCMS 1.2.2 allows remote attackers to execute arbitrary PHP code by specifying a .php filename in a "SET GLOBAL general_log_file" statement, followed by a SELECT statement containing this PHP code.
0
Attacker Value
Unknown

CVE-2018-18450

Disclosure Date: October 17, 2018 (last updated November 27, 2024)
apps\admin\controller\content\SingleController.php in PbootCMS before V1.3.0 build 2018-11-12 has SQL Injection, as demonstrated by the POST data to the admin.php/Single/mod/mcode/1/id/3 URI.
0
Attacker Value
Unknown

CVE-2018-18211

Disclosure Date: October 10, 2018 (last updated November 27, 2024)
PbootCMS 1.2.1 has SQL injection via the HTTP POST data to the api.php/cms/addform?fcode=1 URI.
0
Attacker Value
Unknown

CVE-2018-17364

Disclosure Date: September 23, 2018 (last updated November 27, 2024)
OTCMS 3.61 allows remote attackers to execute arbitrary PHP code via the accBackupDir parameter.
0
Attacker Value
Unknown

CVE-2018-17085

Disclosure Date: September 16, 2018 (last updated November 27, 2024)
An issue was discovered in OTCMS 3.61. XSS exists in admin/users.php via these parameters: dataTypeCN dataMode dataModeStr.
0
Attacker Value
Unknown

CVE-2018-17086

Disclosure Date: September 16, 2018 (last updated November 27, 2024)
An issue was discovered in OTCMS 3.61. XSS exists in admin/share_switch.php via these parameters: fieldName fieldName2 tabName.
0
Attacker Value
Unknown

CVE-2018-16980

Disclosure Date: September 12, 2018 (last updated November 27, 2024)
dotCMS V5.0.1 has XSS in the /html/portlet/ext/contentlet/image_tools/index.jsp fieldName and inode parameters.
0
Attacker Value
Unknown

The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" …

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187). An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.
0
Attacker Value
Unknown

The dotCMS administration panel, versions 3.7.1 and earlier, are vulnerable to …

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
The dotCMS administration panel, versions 3.7.1 and earlier, are vulnerable to cross-site request forgery. The dotCMS administrator panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.
0
Attacker Value
Unknown

The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" …

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to arbitrary file upload. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.
0