Page 5 of 30 results (0.007 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS). WBCE CMS versión 1.5.2, es vulnerable a un ataque de tipo Cross Site Scripting (XSS) • https://github.com/APTX-4879/CVE https://github.com/APTX-4879/CVE/blob/main/CVE-2022-28477..pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the component /languages/index.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad en el componente /languages/index.php de WBCE CMS versión v1.5.2, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/dota-st/Vulnerability/blob/master/WBCE_CMS.md •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the component /templates/install.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad en el componente /templates/install.php de WBCE CMS versión v1.5.2, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/dota-st/Vulnerability/blob/master/WBCE_CMS_second.md •

CVSS: 9.8EPSS: 12%CPEs: 1EXPL: 3

wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command wbce_cms es vulnerable a una Neutralización Inadecuada de Elementos Especiales usados en un Comando SQL WBCE CMS versions 1.5.1 and below suffer from an administrative password reset vulnerability. • https://www.exploit-db.com/exploits/50609 http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html https://github.com/wbce/wbce_cms/commit/6ca63f0cad5f0cd606fdb69a372f09b7d238f1d7 https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code. • https://github.com/kbgsft/vuln-wbce/wiki/Arbitrary-file-upload-vulnerbility-in-WBCE-CMS-1.4.0 • CWE-706: Use of Incorrectly-Resolved Name or Reference •