24 results (0.020 seconds)

CVSS: 6.9EPSS: 0%CPEs: 12EXPL: 1

A vulnerability was found in bg5sbk MiniCMS up to 1.11 and classified as problematic. This issue affects some unknown processing of the file post-edit.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/bg5sbk/MiniCMS/issues/51 https://vuldb.com/?ctiid.278663 https://vuldb.com/?id.278663 https://vuldb.com/?submit.411164 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 1

Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker to execute arbitrary code via a crafted get request. • https://github.com/bg5sbk/MiniCMS/issues/40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Cross Site Scripting (XSS) in MiniCMS v1.10 allows remote attackers to execute arbitrary code by injecting commands via a crafted HTTP request to the component "/mc-admin/post-edit.php". Una vulnerabilidad de tipo Una vulnerabilidad de tipo Cross Site Scripting (XSS) en MiniCMS versión v1.10, permite a atacantes remotos ejecutar código arbitrario al inyectar comandos por medio de una petición HTTP diseñada al componente "/mc-admin/post-edit.php" • https://github.com/bg5sbk/MiniCMS/issues/27 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

Directory traversal vulnerability in page_edit.php in MiniCMS V1.10 allows remote attackers to read arbitrary files via the state parameter. Una vulnerabilidad de salto de directorio en el archivo page_edit.php en MiniCMS versión V1.10, permite a atacantes remotos leer archivos arbitrarios por medio del parámetro state • https://github.com/bg5sbk/MiniCMS/issues/39 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

Directory traversal vulnerability in post-edit.php in MiniCMS V1.10 allows remote attackers to include and execute arbitrary files via the state parameter. Una vulnerabilidad de salto de directorio en el archivo post-edit.php en MiniCMS versión V1.10, permite a atacantes remotos incluir y ejecutar archivos arbitrarios por medio del parámetro state • https://github.com/bg5sbk/MiniCMS/issues/38 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •