Filtered by vendor Wcms
Subscribe
Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-8875 | 1 Wcms | 1 Wcms | 2024-09-20 | 5.5 MEDIUM | 9.1 CRITICAL |
A vulnerability classified as critical was found in vedees wcms up to 0.3.2. Affected by this vulnerability is an unknown functionality of the file /wex/finder.php. The manipulation of the argument p leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2020-19902 | 1 Wcms | 1 Wcms | 2024-02-28 | N/A | 9.8 CRITICAL |
Directory Traversal vulnerability found in Cryptoprof WCMS v.0.3.2 allows a remote attacker to execute arbitrary code via the wex/cssjs.php parameter. | |||||
CVE-2023-31689 | 1 Wcms | 1 Wcms | 2024-02-28 | N/A | 9.8 CRITICAL |
In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution. | |||||
CVE-2020-24137 | 1 Wcms | 1 Wcms | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory traversal vulnerability in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the path parameter to wex/cssjs.php. | |||||
CVE-2020-24140 | 1 Wcms | 1 Wcms | 2024-02-28 | 7.5 HIGH | 8.3 HIGH |
Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services. | |||||
CVE-2020-24135 | 1 Wcms | 1 Wcms | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Wcms 0.3.2, which allows remote attackers to inject arbitrary web script and HTML via the type parameter to wex/cssjs.php. | |||||
CVE-2020-24136 | 1 Wcms | 1 Wcms | 2024-02-28 | 7.8 HIGH | 8.6 HIGH |
Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php. | |||||
CVE-2020-24138 | 1 Wcms | 1 Wcms | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross Site Scripting (XSS) vulnerability in wcms 0.3.2 allows remote attackers to inject arbitrary web script and HTML via the pagename parameter to wex/html.php. | |||||
CVE-2020-24139 | 1 Wcms | 1 Wcms | 2024-02-28 | 7.5 HIGH | 8.3 HIGH |
Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services. | |||||
CVE-2019-11377 | 1 Wcms | 1 Wcms | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
wcms/wex/finder/action.php in WCMS v0.3.2 has a Arbitrary File Upload Vulnerability via developer/finder because .php is a valid extension according to the fm_get_text_exts function. | |||||
CVE-2019-14240 | 1 Wcms | 1 Wcms | 2024-02-28 | 5.8 MEDIUM | 8.1 HIGH |
WCMS v0.3.2 has a CSRF vulnerability, with resultant directory traversal, to modify index.html via the /wex/html.php?finish=../index.html URI. |