Page 3 of 100 results (0.001 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

12 Oct 2018 — XSS exists in CMS Made Simple version 2.2.7 via the m1_news_url parameter in an admin/moduleinterface.php "Content-->News-->Add Article" action. Existe Cross-Site Scripting (XSS) en CMS Made Simple 2.2.7 mediante el parámetro m1_news_url en una acción "Content-->News-->Add Article" en admin/moduleinterface.php. • https://github.com/cmsmadesimple/cmsmadesimple-2-0/issues/12 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

12 Oct 2018 — XSS exists in CMS Made Simple version 2.2.7 via the m1_extra parameter in an admin/moduleinterface.php "Content-->News-->Add Article" action. Existe Cross-Site Scripting (XSS) en CMS Made Simple 2.2.7 mediante el parámetro m1_extra en una acción "Content-->News-->Add Article" en admin/moduleinterface.php. • https://github.com/cmsmadesimple/cmsmadesimple-2-0/issues/13 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 2%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "file unpack" operation in the admin dashboard contains a remote code execution vulnerability exploitable by an admin user because a .php file can be present in the extracted ZIP archive. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "file unpack" en el dashboard de administrador contiene una vulnerabilidad de ejecución remota de código explotable por un usuario administrador debido a que puede haber un archivo .php en el archivo ZIP extraído. • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "file rename" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by an admin user, that can cause DoS by moving config.php to the upload/ directory. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "file rename" en el dashboard de administrador contiene una vulnerabilidad de divulgación de información sensible, explotable por un usuario administrador, que puede provocar una denegación de servici... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 18%CPEs: 1EXPL: 4

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "module import" operation in the admin dashboard contains a remote code execution vulnerability, exploitable by an admin user, because an XML Package can contain base64-encoded PHP code in a data element. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "module import" en el dashboard de administrador contiene una vulnerabilidad de ejecución remota de código explotable por un usuario administrador debido a que un paquete XML puede contener código ... • https://packetstorm.news/files/id/150173 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "file delete" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "module import" en el dashboard de administrador contiene una vulnerabilidad de eliminación de archivos arbitrarios que puede provocar una denegación de servicio (DoS), explotable por un u... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — CMS Made Simple (CMSMS) 2.2.7 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because files in the tmp/ directory are accessible through HTTP requests. NOTE: this vulnerability exists because of an incorrect fix for CVE-2018-10084. CMS Made Simple (CMSMS) 2.2.7 contiene una vulnerabilidad de escalado de privilegios de usuario ordinario a usuario administrador haciendo que el valor de eff_uid en $_... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "module remove" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "module remove" en el dashboard de administrador contiene una vulnerabilidad de eliminación de archivos arbitrarios que puede provocar una denegación de servicio (DoS), explotable por un... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "file move" operation in the admin dashboard contains an arbitrary file movement vulnerability that can cause DoS, exploitable by an admin user, because config.php can be moved into an incorrect directory. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "file move" en el dashboard de administrador contiene una vulnerabilidad de movimiento de archivos arbitrarios que puede provocar una denegación de servicio (DoS), explotable por un usuario admini... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 1

27 Apr 2018 — In CMS Made Simple (CMSMS) through 2.2.7, the "file view" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by ordinary users, because the product exposes unrestricted access to the PHP file_get_contents function. En CMS Made Simple (CMSMS) hasta la versión 2.2.7, la operación "file view" en el dashboard de administrador contiene una vulnerabilidad de divulgación de información sensible, explotable por los usuarios ordinarios, debido a que el producto ex... • https://github.com/itodaro/cmsms_cve/blob/master/README.md • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •