Vulnerabilities (CVE)

Filtered by vendor Usualtool Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-6244 1 Usualtool 1 Usualtoolcms 2024-11-21 6.8 MEDIUM 8.8 HIGH
An issue was discovered in UsualToolCMS 8.0. cmsadmin/a_sqlbackx.php?t=sql allows CSRF attacks that can execute SQL statements, and consequently execute arbitrary PHP code by writing that code into a .php file.
CVE-2018-20128 1 Usualtool 1 Usualtoolcms 2024-11-21 6.4 MEDIUM 7.5 HIGH
An issue was discovered in UsualToolCMS v8.0. cmsadmin\a_sqlback.php allows remote attackers to delete arbitrary files via a backname[] directory-traversal pathname followed by a crafted substring.
CVE-2018-18422 1 Usualtool 1 Usualtoolcms 2024-11-21 6.8 MEDIUM 8.8 HIGH
UsualToolCMS 8.0 allows CSRF for adding a user account via the cmsadmin/a_adminx.php?x=a URI.
CVE-2024-9917 1 Usualtool 1 Usualtoolcms 2024-10-19 6.5 MEDIUM 4.9 MEDIUM
A vulnerability, which was classified as critical, was found in HuangDou UTCMS V9. This affects an unknown part of the file app/modules/ut-template/admin/template_creat.php. The manipulation of the argument content leads to deserialization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-9918 1 Usualtool 1 Usualtoolcms 2024-10-19 5.8 MEDIUM 7.2 HIGH
A vulnerability has been found in HuangDou UTCMS V9 and classified as critical. This vulnerability affects the function RunSql of the file app/modules/ut-data/admin/sql.php. The manipulation of the argument sql leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-9916 1 Usualtool 1 Usualtoolcms 2024-10-16 7.5 HIGH 9.8 CRITICAL
A vulnerability, which was classified as critical, has been found in HuangDou UTCMS V9. Affected by this issue is some unknown functionality of the file app/modules/ut-cac/admin/cli.php. The manipulation of the argument o leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.