Filtered by vendor Cmsmadesimple
Subscribe
Total
149 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-10081 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
CMS Made Simple (CMSMS) through 2.2.6 contains an admin password reset vulnerability because data values are improperly compared, as demonstrated by a hash beginning with the "0e" substring. | |||||
CVE-2018-1000094 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. This attack appear to be exploitable via File upload -> copy to any extension. | |||||
CVE-2018-7893 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (CMSMS) 2.2.6 has stored XSS in admin/moduleinterface.php via the metadata parameter. | |||||
CVE-2018-1000158 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 4.3 MEDIUM | 8.8 HIGH |
cmsmadesimple version 2.2.7 contains a Incorrect Access Control vulnerability in the function of send_recovery_email in the line "$url = $config['admin_url'] . '/login.php?recoverme=' . $code;" that can result in Administrator Password Reset Poisoning, specifically a reset URL pointing at an attacker controlled server can be created by using a host header attack. | |||||
CVE-2018-5964 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_messages parameter. | |||||
CVE-2018-10029 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (aka CMSMS) 2.2.7 has Reflected XSS in admin/moduleinterface.php via the m1_name parameter, related to moduledepends, a different vulnerability than CVE-2017-16799. | |||||
CVE-2018-10521 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 4.0 MEDIUM | 2.7 LOW |
In CMS Made Simple (CMSMS) through 2.2.7, the "file move" operation in the admin dashboard contains an arbitrary file movement vulnerability that can cause DoS, exploitable by an admin user, because config.php can be moved into an incorrect directory. | |||||
CVE-2018-10032 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (aka CMSMS) 2.2.7 has Reflected XSS in admin/moduleinterface.php via the m1_version parameter. | |||||
CVE-2018-10516 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 5.5 MEDIUM | 6.5 MEDIUM |
In CMS Made Simple (CMSMS) through 2.2.7, the "file rename" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by an admin user, that can cause DoS by moving config.php to the upload/ directory. | |||||
CVE-2018-8058 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (CMSMS) 2.2.6 has XSS in admin/moduleinterface.php via the pagedata parameter. | |||||
CVE-2018-5963 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/addbookmark.php via the title parameter. | |||||
CVE-2018-10522 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 4.0 MEDIUM | 4.9 MEDIUM |
In CMS Made Simple (CMSMS) through 2.2.7, the "file view" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by ordinary users, because the product exposes unrestricted access to the PHP file_get_contents function. | |||||
CVE-2018-10033 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
CMS Made Simple (aka CMSMS) 2.2.7 has Stored XSS in admin/siteprefs.php via the metadata parameter. | |||||
CVE-2018-10520 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 8.5 HIGH | 6.5 MEDIUM |
In CMS Made Simple (CMSMS) through 2.2.7, the "module remove" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories. | |||||
CVE-2018-10518 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 8.5 HIGH | 6.5 MEDIUM |
In CMS Made Simple (CMSMS) through 2.2.7, the "file delete" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories. | |||||
CVE-2018-1000092 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
CMS Made Simple version versions 2.2.5 contains a Cross ite Request Forgery (CSRF) vulnerability in Admin profile page that can result in Details can be found here http://dev.cmsmadesimple.org/bug/view/11715. This attack appear to be exploitable via A specially crafted web page. This vulnerability appears to have been fixed in 2.2.6. | |||||
CVE-2018-10086 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary code execution vulnerability in the admin dashboard because the implementation uses "eval('function testfunction'.rand()" and it is possible to bypass certain restrictions on these "testfunction" functions. | |||||
CVE-2018-10082 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
CMS Made Simple (CMSMS) through 2.2.7 allows physical path leakage via an invalid /index.php?page= value, a crafted URI starting with /index.php?mact=Search, or a direct request to /admin/header.php, /admin/footer.php, /lib/tasks/class.ClearCache.task.php, or /lib/tasks/class.CmsSecurityCheck.task.php. | |||||
CVE-2017-17734 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
CMS Made Simple (CMSMS) before 2.2.5 does not properly cache login information in sessions. | |||||
CVE-2017-9668 | 1 Cmsmadesimple | 1 Cms Made Simple | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
In admin\addgroup.php in CMS Made Simple 2.1.6, when adding a user group, there is no XSS filtering, resulting in storage-type XSS generation, via the description parameter in an addgroup action. |