
CVE-2023-7191 – S-CMS reg.php sql injection
https://notcve.org/view.php?id=CVE-2023-7191
31 Dec 2023 — A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. • https://note.zhaoj.in/share/Fmytf7wBINbP • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7190 – S-CMS sql injection
https://notcve.org/view.php?id=CVE-2023-7190
31 Dec 2023 — A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/0ZY7hEQAskqM • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7189 – S-CMS sql injection
https://notcve.org/view.php?id=CVE-2023-7189
31 Dec 2023 — A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/9yaojoQvesLu • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-20340
https://notcve.org/view.php?id=CVE-2020-20340
01 Sep 2021 — A SQL injection vulnerability in the 4.edu.php\conn\function.php component of S-CMS v1.0 allows attackers to access sensitive database information. Una vulnerabilidad de inyección SQL en el componente 4.edu.php\conn\function.php de S-CMS versión v1.0, permite a atacantes acceder a información confidencial de la base de datos • https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2020-19046
https://notcve.org/view.php?id=CVE-2020-19046
31 Aug 2021 — Cross Site Scripting (XSS) in S-CMS v1.0 allows remote attackers to execute arbitrary code via the component '/admin/tpl.php?page='. Una vulnerabilidad de tipo Cross Site Scripting (XSS) en S-CMS versión v1.0, permite a atacantes remotos ejecutar código arbitrario por medio del componente "/admin/tpl.php?page=" • https://github.com/Aoyanm/audit/issues/1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-10708
https://notcve.org/view.php?id=CVE-2019-10708
02 Apr 2019 — S-CMS PHP v1.0 has SQL injection via the 4/js/scms.php?action=unlike id parameter. S-CMS PHP v1.0 tiene una inyección SQL mediante el parámetro id en 4/js/scms.php?action=unlike. • https://github.com/stavhaygn/CVE-2019-10708 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2019-10237
https://notcve.org/view.php?id=CVE-2019-10237
27 Mar 2019 — S-CMS PHP v1.0 has a CSRF vulnerability to add a new admin user via the 4.edu.php/admin/ajax.php?type=admin&action=add&lang=0 URI, a related issue to CVE-2019-9040. S-CMS PHP v1.0 tiene una vulnerabilidad Cross-Site Request Forgery (CSRF) para añadir un nuevo usuario administrador mediante el URI 4.edu.php/admin/ajax.php?type=adminaction=addlang=0. Este problema está relacionado con CVE-2019-9040. • http://www.iwantacve.cn/index.php/archives/172 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2019-9925
https://notcve.org/view.php?id=CVE-2019-9925
22 Mar 2019 — S-CMS PHP v1.0 has XSS in 4.edu.php via the S_id parameter. S-CMS PHP v1.0 tiene Cross-Site Scripting (XSS) en 4.edu.php mediante el parámetro S_id. • http://www.iwantacve.cn/index.php/archives/163 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-20480
https://notcve.org/view.php?id=CVE-2018-20480
26 Dec 2018 — An issue was discovered in S-CMS 1.0. It allows SQL Injection via the js/pic.php P_id parameter. Se ha descubierto un problema en S-CMS 1.0. Permite la inyección SQL mediante el parámetro P_id en js/pic.php. • https://xz.aliyun.com/t/3614#toc-2 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2018-20478
https://notcve.org/view.php?id=CVE-2018-20478
26 Dec 2018 — An issue was discovered in S-CMS 1.0. It allows reading certain files, such as PHP source code, via the admin/download.php DownName parameter with a mixed-case extension, as demonstrated by a DownName=download.Php value. Se ha descubierto un problema en S-CMS 1.0. Permite la lectura de ciertos archivos, como el código fuente en PHP, mediante el parámetro DownName en admin/download.php con una extensión con mayúsculas y minúsculas. Esto queda demostrado por un valor DownName=download.Php. • https://xz.aliyun.com/t/3614#toc-0 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •