Page 5 of 29 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the component /languages/index.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad en el componente /languages/index.php de WBCE CMS versión v1.5.2, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/dota-st/Vulnerability/blob/master/WBCE_CMS.md •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the component /templates/install.php of WBCE CMS v1.5.2 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad en el componente /templates/install.php de WBCE CMS versión v1.5.2, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://github.com/dota-st/Vulnerability/blob/master/WBCE_CMS_second.md •

CVSS: 9.8EPSS: 12%CPEs: 1EXPL: 3

wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command wbce_cms es vulnerable a una Neutralización Inadecuada de Elementos Especiales usados en un Comando SQL WBCE CMS versions 1.5.1 and below suffer from an administrative password reset vulnerability. • https://www.exploit-db.com/exploits/50609 http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html https://github.com/wbce/wbce_cms/commit/6ca63f0cad5f0cd606fdb69a372f09b7d238f1d7 https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code. • https://github.com/kbgsft/vuln-wbce/wiki/Arbitrary-file-upload-vulnerbility-in-WBCE-CMS-1.4.0 • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) in WBCE CMS 1.3.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the Modify Page screen, a different issue than CVE-2017-2118. Una vulnerabilidad Cross-Site Scripting (XSS) en WBCE CMS 1.3.1 permite que los administradores autenticados inyecten scripts web o HTML arbitrarios mediante la pantalla Modify Page. Esta vulnerabilidad es diferente de CVE-2017-2118. • https://github.com/imsebao/404team/blob/master/wbce_cms_xss.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •