Page 7 of 36 results (0.003 seconds)

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter. Vulnerabilidad de salto de directorio en el dotTailLogServlet en dotCMS en versiones anteriores a 3.5.1 permite a administradores remotos autenticados leer archivos arbitrarios a través de un .. (punto punto) en el parámetro fileName. • http://dotcms.com/security/SI-34 http://seclists.org/fulldisclosure/2016/Apr/36 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in dotCMS before 3.5 allows remote administrators to execute arbitrary SQL commands via the c0-e3 parameter to dwr/call/plaincall/UserAjax.getUsersList.dwr. Vulnerabilidad de inyección SQL en dotCMS en versiones anteriores a 3.5 permite a administradores remotos ejecutar comandos SQL arbitrarios a través del parámetro c0-e3 en dwr/call/plaincall/UserAjax.getUsersList.dwr. DotCMS version 3.3 suffers from a remote SQL injection vulnerability. • http://dotcms.com/security/SI-32 http://packetstormsecurity.com/files/136548/DotCMS-3.3-SQL-Injection.html http://seclists.org/fulldisclosure/2016/Apr/11 http://seclists.org/fulldisclosure/2016/Apr/5 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in dotCMS before 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) _loginUserName parameter to application/login/login.html, (2) my_account_login parameter to c/portal_public/login, or (3) email parameter to forgotPassword. Múltiples vulnerabilidades de XSS en dotCMS anterior a 2.3.2 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a través del (1) parámetro _loginUserName hacia application/login/login.html, (2) parámetro my_account_login hacia c/portal_public/login o (3) parámetro email hacia forgotPassword. • http://dotcms.com/security/SI-14 http://secunia.com/advisories/53265 https://github.com/dotCMS/dotCMS/issues/2949 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 0

dotCMS 1.9 before 1.9.5.1 allows remote authenticated users to execute arbitrary Java code via a crafted (1) XSLT or (2) Velocity template. dotCMS v1.9 anteriores a v1.9.5.1 permite a usuarios remotos autenticados ejecutar código JAVA a través de las plantillas (1) XSLT o (2) Velocity manipuladas. • http://dotcms.com/dotCMSVersions http://osvdb.org/82240 http://secunia.com/advisories/49276 http://www.kb.cert.org/vuls/id/898083 http://www.securityfocus.com/bid/53688 https://gist.github.com/2627440 https://github.com/dotCMS/dotCMS/issues/261 https://github.com/dotCMS/dotCMS/issues/281 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 1

Multiple directory traversal vulnerabilities in dotCMS 1.6.0.9 allow remote attackers to read arbitrary files via a .. (dot dot) in the id parameter to (1) news/index.dot and (2) getting_started/macros/macros_detail.dot. Múltiples vulnerabilidades de salto de directorio en dotCMS 1.6.0.9 permiten a atacantes remotos leer ficheros arbitrariamente mediante un .. (punto punto) en los parámetros id de (1) news/index.dot y (2) getting_started/macros/macros_detail.dot. • https://www.exploit-db.com/exploits/6247 http://secunia.com/advisories/31516 http://securityreason.com/securityalert/4163 http://www.securityfocus.com/bid/30703 https://exchange.xforce.ibmcloud.com/vulnerabilities/44491 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •