Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-31689 | 1 Wcms | 1 Wcms | 2024-11-21 | N/A | 9.8 CRITICAL |
In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution. | |||||
CVE-2020-24140 | 1 Wcms | 1 Wcms | 2024-11-21 | 7.5 HIGH | 8.3 HIGH |
Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services. | |||||
CVE-2020-24139 | 1 Wcms | 1 Wcms | 2024-11-21 | 7.5 HIGH | 8.3 HIGH |
Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services. | |||||
CVE-2020-24138 | 1 Wcms | 1 Wcms | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross Site Scripting (XSS) vulnerability in wcms 0.3.2 allows remote attackers to inject arbitrary web script and HTML via the pagename parameter to wex/html.php. | |||||
CVE-2020-24137 | 1 Wcms | 1 Wcms | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory traversal vulnerability in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the path parameter to wex/cssjs.php. | |||||
CVE-2020-24136 | 1 Wcms | 1 Wcms | 2024-11-21 | 7.8 HIGH | 8.6 HIGH |
Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php. | |||||
CVE-2020-24135 | 1 Wcms | 1 Wcms | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Wcms 0.3.2, which allows remote attackers to inject arbitrary web script and HTML via the type parameter to wex/cssjs.php. | |||||
CVE-2020-19902 | 1 Wcms | 1 Wcms | 2024-11-21 | N/A | 9.8 CRITICAL |
Directory Traversal vulnerability found in Cryptoprof WCMS v.0.3.2 allows a remote attacker to execute arbitrary code via the wex/cssjs.php parameter. | |||||
CVE-2019-14240 | 1 Wcms | 1 Wcms | 2024-11-21 | 5.8 MEDIUM | 8.1 HIGH |
WCMS v0.3.2 has a CSRF vulnerability, with resultant directory traversal, to modify index.html via the /wex/html.php?finish=../index.html URI. | |||||
CVE-2019-11377 | 1 Wcms | 1 Wcms | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
wcms/wex/finder/action.php in WCMS v0.3.2 has a Arbitrary File Upload Vulnerability via developer/finder because .php is a valid extension according to the fm_get_text_exts function. | |||||
CVE-2024-8875 | 1 Wcms | 1 Wcms | 2024-09-20 | 5.5 MEDIUM | 9.1 CRITICAL |
A vulnerability classified as critical was found in vedees wcms up to 0.3.2. Affected by this vulnerability is an unknown functionality of the file /wex/finder.php. The manipulation of the argument p leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |