5 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Wonder CMS 2014 allows remote attackers to obtain sensitive information by viewing /files/password, which reveals the unsalted MD5 hashed password. Wonder CMS 2014 permite a atacantes remotos obtener información sensible mediante la visualización de /files/password, lo que revela la contraseña de hash MD5 sin saltar. • http://rossmarks.uk/portfolio.php http://rossmarks.uk/whitepapers/wonder_cms_2014.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in Wonder CMS 2014 allows remote attackers to inject arbitrary web script or HTML. Vulnerabilidad de XSS en Wonder CMS 2014 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios. • http://rossmarks.uk/portfolio.php http://rossmarks.uk/whitepapers/wonder_cms_2014.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in index.php in Wonder CMS 2014 allows remote attackers to include and execute arbitrary local files via a crafted theme. Vulnerabilidad de slato de directorio en index.php en Wonder CMS 2014 permite a atacantes remotos incluir y ejecutar archivos locales arbitrarios a través de un tema manipulado. • http://rossmarks.uk/portfolio.php • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

PHP remote file inclusion vulnerability in editInplace.php in Wonder CMS 2014 allows remote attackers to execute arbitrary PHP code via a URL in the hook parameter. Vulnerabilidad de inclusión de archivos remotos de PHP en editInplace.php en Wonder CMS 2014 permite a atacantes remotos ejecutar código PHP arbitrario a través de una URL en el parámetro hook. • http://rossmarks.uk/portfolio.php http://rossmarks.uk/whitepapers/wonder_cms_2014.txt • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

Wonder CMS 2014 allows remote attackers to obtain sensitive information by logging into the application with an array for the password, which reveals the installation path in an error message. Wonder CMS 2014 permite a atacantes remotos obtener información sensible iniciando sesión en la aplicación con una matriz para la contraseña, lo que revela la ruta de instalación en un mensaje de error. • http://rossmarks.uk/portfolio.php http://rossmarks.uk/whitepapers/wonder_cms_2014.txt http://www.securityfocus.com/bid/97192 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •