Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-48863 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 7.5 HIGH |
SEMCMS 3.9 is vulnerable to SQL Injection. Due to the lack of security checks on the input of the application, the attacker uses the existing application to inject malicious SQL commands into the background database engine for execution, and sends some attack codes as commands or query statements to the interpreter. These malicious data can deceive the interpreter, so as to execute unplanned commands or unauthorized access to data. | |||||
CVE-2023-48864 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 7.5 HIGH |
SEMCMS v4.8 was discovered to contain a SQL injection vulnerability via the languageID parameter in /web_inc.php. | |||||
CVE-2023-50563 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
Semcms v4.8 was discovered to contain a SQL injection vulnerability via the AID parameter at SEMCMS_Function.php. | |||||
CVE-2020-23564 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 7.2 HIGH |
File Upload vulnerability in SEMCMS 3.9 allows remote attackers to run arbitrary code via SEMCMS_Upfile.php. | |||||
CVE-2023-37647 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS v1.5 was discovered to contain a SQL injection vulnerability via the id parameter at /Ant_Suxin.php. | |||||
CVE-2023-31707 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS 1.5 is vulnerable to SQL Injection via Ant_Rponse.php. | |||||
CVE-2023-30090 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
Semcms Shop v4.2 was discovered to contain an arbitrary file uplaod vulnerability via the component SEMCMS_Upfile.php. This vulnerability allows attackers to execute arbitrary code via uploading a crafted PHP file. | |||||
CVE-2020-18432 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
File Upload vulnerability in SEMCMS PHP 3.7 allows remote attackers to upload arbitrary files and gain escalated privileges. | |||||
CVE-2021-38731 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php. | |||||
CVE-2021-38736 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS Shop V 1.1 is vulnerable to SQL Injection via Ant_Global.php. | |||||
CVE-2021-38730 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Info.php. | |||||
CVE-2021-38732 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL via Ant_Message.php. | |||||
CVE-2021-38728 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 6.1 MEDIUM |
SEMCMS SHOP v 1.1 is vulnerable to Cross Site Scripting (XSS) via Ant_M_Coup.php. | |||||
CVE-2021-38217 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php. | |||||
CVE-2021-38729 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Plist.php. | |||||
CVE-2022-2726 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
A vulnerability classified as critical has been found in SEMCMS. This affects an unknown part of the file Ant_Check.php. The manipulation of the argument DID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205839. | |||||
CVE-2021-38734 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Menu.php. | |||||
CVE-2021-38733 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_BlogCat.php. | |||||
CVE-2021-38737 | 1 Sem-cms | 1 Semcms | 2024-02-28 | N/A | 9.8 CRITICAL |
SEMCMS v 1.1 is vulnerable to SQL Injection via Ant_Pro.php. | |||||
CVE-2020-18078 | 1 Sem-cms | 1 Semcms | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account's password. |