Page 7 of 40 results (0.001 seconds)

CVSS: 7.2EPSS: 1%CPEs: 1EXPL: 2

SeaCMS 6.61 allows remote attackers to execute arbitrary code because parseIf() in include/main.class.php does not block use of $GLOBALS. SeaCMS 6.61 permite que atacantes remotos ejecuten código arbitrario debido a que parseIf() en include/main.class.php no bloquea el uso de $GLOBALS. • http://zhinianyuxin.postach.io/post/seacms-v6-61-latest-version-backend-rce https://github.com/cumtxujiabin/CmsPoc/blob/master/Seacms_v6.61_backend_RCE.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

SeaCMS V6.61 has XSS via the admin_video.php v_content parameter, related to the site name. SeaCMS V6.61 tiene Cross-Site Scripting (XSS) mediante el parámetro v_content en admin_video.php. Esto está relacionado con el nombre del sitio. • https://github.com/Jas0nwhy/vulnerability/blob/master/Seacmsxss.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

SeaCMS v6.61 allows Remote Code execution by placing PHP code in an allowed IP address (aka ip) to /admin/admin_ip.php (aka /adm1n/admin_ip.php). The code is executed by visiting adm1n/admin_ip.php or data/admin/ip.php. This can also be exploited through CSRF. SeaCMS v6.61 permite la ejecución remota de código colocando código PHP en una dirección IP permitida (también conocida como ip) en /admin/admin_ip.php (también conocida como /adm1n/admin_ip.php). El código se ejecuta al visitar adm1n/admin_ip.php o data/admin/ip.php. • https://github.com/MichaelWayneLIU/seacms/blob/master/seacms2.md • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

SeaCMS 6.61 has two XSS issues in the admin_config.php file via certain form fields. SeaCMS 6.61 tiene dos problemas de Cross-Site Scripting (XSS) en el archivo admin_config.php mediante ciertos campos de formulario. • https://github.com/SecWiki/CMS-Hunter/blob/master/seacms/seacms6.61/seacms661.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

SeaCMS v6.61 allows Remote Code execution by placing PHP code in a movie picture address (aka v_pic) to /admin/admin_video.php (aka /backend/admin_video.php). The code is executed by visiting /details/index.php. This can also be exploited through CSRF. SeaCMS v6.61 permite la ejecución remota de código colocando código PHP en una dirección de imagen de película (v#95;pic) en /admin/admin_video.php (/backend/admin_video.php). El código se ejecuta al visitar /details/index.php. • http://hexo.imagemlt.xyz/post/seacms-backend-getshell/index.html • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-352: Cross-Site Request Forgery (CSRF) •