Page 2 of 10 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

SeaCMS v12.8 has an arbitrary code writing vulnerability in the /jxz7g2/admin_ping.php file. SeaCMS v12.8 tiene una vulnerabilidad de escritura de código arbitrario en el archivo /jxz7g2/admin_ping.php. • https://blog.csdn.net/weixin_51394168/article/details/132817842 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account. Un Cross-Site Request Forgery (CSRF) en admin_manager.php de Seacms hasta v12.8 permite a los atacantes agregar arbitrariamente una cuenta de administrador. • http://seacms.com https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501 https://www.seacms.net • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

SeaCms before v12.6 was discovered to contain a SQL injection vulnerability via the component /js/player/dmplayer/dmku/index.php. Se descubrió que SeaCms anterior a v12.6 contenía una vulnerabilidad de inyección SQL a través del componente /js/player/dmplayer/dmku/index.php. • https://github.com/seacms-com/seacms/issues/23 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

SeaCMS 7.2 mishandles member.php?mod=repsw4 requests. SeaCMS 7.2 gestiona de manera incorrecta las peticiones member.php?mod=repsw4. • https://github.com/seacms/seacms-v7.2/issues/2 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

SeaCMS 6.64 and 7.2 allows remote attackers to delete arbitrary files via the filedir parameter. SeaCMS versión 6.64 y versión 7.2 permite a los atacantes remotos eliminar archivos arbitrarios mediante el parámetro filedir. • http://blog.51cto.com/13770310/2177226 https://github.com/sfh320/seacms/issues/1 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •