Page 2 of 14 results (0.001 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

26 Feb 2019 — There is a CSRF in ZZZCMS zzzphp V1.6.1 via a /admin015/save.php?act=editfile request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the filetext parameter. Hay Cross-Site Request Forgery (CSRF) en ZZZCMS zzzphp V1.6.1 mediante una petición en /admin015/save.php?act=editfile. • http://www.iwantacve.cn/index.php/archives/119 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.3EPSS: 97%CPEs: 3EXPL: 6

24 Feb 2019 — ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command. ThinkPHP, en versiones anteriores a la 3.2.4, tal y como se emplea en Open Source BMS v1.1.1 y otros productos, permite la ejecución remota de comandos mediante public//?s=index/\think\app/invokefunctionfunction=call_user_func_arrayvars[0]=systemvars[1][]=, seguido por el co... • https://packetstorm.news/files/id/151967 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-306: Missing Authentication for Critical Function •

CVSS: 7.2EPSS: 4%CPEs: 1EXPL: 2

23 Feb 2019 — An issue was discovered in ZZZCMS zzzphp V1.6.1. In the inc/zzz_template.php file, the parserIfLabel() function's filtering is not strict, resulting in PHP code execution, as demonstrated by the if:assert substring. Se ha descubierto un problema en ZZZCMS zzzphp V1.6.1. En el archivo inc/zzz_template.php, el filtrado de la función parserIfLabel() no es estricto, lo que resulta en la ejecución de código PHP, tal y como queda demostrado por la subcadena if:assert. ZZZPHP CMS version 1.6.1 suffers from a remot... • https://packetstorm.news/files/id/151824 • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

13 Dec 2018 — An issue was discovered in zzzphp cms 1.5.8. del_file in /admin/save.php allows remote attackers to delete arbitrary files via a mixed-case extension and an extra '.' character, because (for example) "php" is blocked but path=F:/1.phP. succeeds. Se ha descubierto un problema en zzzphp cms 1.5.8. del_file en /admin/save.php permite que atacantes remotos eliminen archivos arbitrarios mediante una extensión con mayúsculas y minúsculas y un carácter "." extra. Esto se debe a que, por ejemplo, "php" se bloquea, ... • http://www.iwantacve.cn/index.php/archives/89 • CWE-20: Improper Input Validation •