Page 5 of 26 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file. Se ha detectado que MCMS versión v5.2.4, presenta una vulnerabilidad de carga de archivos arbitrarios en el módulo New Template, que permite a atacantes ejecutar código arbitrario por medio de un archivo ZIP diseñado • https://gitee.com/mingSoft/MCMS/issues/I4Q4NV • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

MCMS v5.2.4 was discovered to have a hardcoded shiro-key, allowing attackers to exploit the key and execute arbitrary code. Se ha detectado que MCMS versión v5.2.4, presenta una clave shiro embebida, que permite a atacantes explotar la clave y ejecutar código arbitrario • https://gitee.com/mingSoft/MCMS/issues/I4Q4RP • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do. Se detectó un problema en ming-soft MCMS versión v5.0, donde un usuario malicioso puede explotar una inyección SQL sin iniciar sesión por medio del archivo /mcms/view.do • https://github.com/ming-soft/MCMS/issues/45 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. Se ha descubierto un problema en com\mingsoft\cms\action\GeneraterAction.java en MCMS 4.6.5. Un atacante puede escribir un archivo .jsp (en el parámetro position) a un directorio arbitrario mediante un ../ (salto de directorio) en el parámetro url. • https://gitee.com/mingSoft/MCMS/issues/IO0K0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code. • https://gitee.com/mingSoft/MCMS/issues/IO0IQ • CWE-434: Unrestricted Upload of File with Dangerous Type •