5 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in UJCMS up to 6.0.2 and classified as problematic. This vulnerability affects unknown code of the component ZIP Package Handler. The manipulation of the argument dir leads to information disclosure. The attack can be initiated remotely. The complexity of an attack is rather high. • https://github.com/ujcms/ujcms/issues/6 https://vuldb.com/?ctiid.231502 https://vuldb.com/?id.231502 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload. • https://github.com/codeb0ss/CVE-2023-34747-PoC https://github.com/ujcms/ujcms/issues/4 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip. • https://github.com/ujcms/ujcms/issues/6 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

Directory traversal vulnerability in ujcms 6.0.2 allows attackers to move files via the rename feature. • https://github.com/ujcms/ujcms/issues/5 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function. • https://github.com/ujcms/ujcms/issues/3 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •