3 results (0.007 seconds)

CVSS: 6.9EPSS: 0%CPEs: 12EXPL: 1

A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/bg5sbk/MiniCMS/issues/51 https://vuldb.com/?ctiid.278663 https://vuldb.com/?id.278663 https://vuldb.com/?submit.411164 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

MiniCMS version 1.1 contains a Cross Site Scripting (XSS) vulnerability in http://example.org/mc-admin/page.php?date={payload} that can result in code injection. MiniCMS, en su versión 6.0.1,1, contiene una vulnerabilidad Cross Site Scripting (XSS) en lhttp://example.org/mc-admin/page.php?date={payload} que puede resultar en la inyección de código. • https://github.com/bg5sbk/MiniCMS/issues/20 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

miniCMS 1.0 and 2.0 allows remote attackers to execute arbitrary PHP code via a crafted (1) pagename or (2) area variable containing an executable extension, which is not properly handled by (a) update.php when writing files to content/, or (b) updatenews.php when writing files to content/news/. miniCMS v1.0 y v2.0, permite a atacantes remotos ejecutar código PHP arbitrario a través de la variable (1) pagename o (2) área manipuladas, que contiene una extensión ejecutable, que no se utilizan con cuidado por (a) update.php al escribir archivos en content/ o (b) updatenews.php al escribir archivos en content/news/. • https://www.exploit-db.com/exploits/18410 http://www.exploit-db.com/exploits/18410 http://www.securityfocus.com/bid/51612 https://exchange.xforce.ibmcloud.com/vulnerabilities/72645 • CWE-94: Improper Control of Generation of Code ('Code Injection') •