Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2022-29725

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file.
Attacker Value
Unknown

CVE-2018-16251

Disclosure Date: June 20, 2019 (last updated November 27, 2024)
A "search for user discovery" injection issue exists in Creatiwity wityCMS 0.6.2 via the "Utilisateur" menu. No input parameters are filtered, e.g., the /admin/user/users Nickname, email, firstname, lastname, and groupe parameters.
0
Attacker Value
Unknown

CVE-2018-16250

Disclosure Date: June 20, 2019 (last updated November 27, 2024)
The "utilisateur" menu in Creatiwity wityCMS 0.6.2 modifies the presence of XSS at two input points for user information, with the "first name" and "last name" parameters.
0
Attacker Value
Unknown

CVE-2018-16776

Disclosure Date: September 10, 2018 (last updated November 27, 2024)
wityCMS 0.6.2 has XSS via the "Site Name" field found in the "Contact" "Configuration" page.
0
Attacker Value
Unknown

CVE-2018-14029

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
CSRF vulnerability in admin/user/edit in Creatiwity wityCMS 0.6.2 allows an attacker to take over a user account, as demonstrated by modifying the account's email field.
0
Attacker Value
Unknown

CVE-2018-12065

Disclosure Date: June 08, 2018 (last updated November 26, 2024)
A Local File Inclusion vulnerability in /system/WCore/WHelper.php in Creatiwity wityCMS 0.6.2 allows remote attackers to include local PHP files (execute PHP code) or read non-PHP files by replacing a helper.json file.
0
Attacker Value
Unknown

CVE-2018-11512

Disclosure Date: May 28, 2018 (last updated November 26, 2024)
Stored cross-site scripting (XSS) vulnerability in the "Website's name" field found in the "Settings" page under the "General" menu in Creatiwity wityCMS 0.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to admin/settings/general.
0