9 results (0.007 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

07 Sep 2024 — A vulnerability was found in lmxcms up to 1.4 and classified as critical. Affected by this issue is the function formatData of the file /admin.php?m=Acquisi&a=testcj&lid=1 of the component SQL Command Execution Module. The manipulation of the argument data leads to code injection. The attack may be launched remotely. • https://github.com/gaorenyusi/gaorenyusi/blob/main/lmx.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

16 Nov 2023 — SQL injection vulnerability in LMXCMS v.1.4 allows attacker to execute arbitrary code via the TagsAction.class. Vulnerabilidad de inyección SQL en LMXCMS v.1.4 permite a un atacante ejecutar código arbitrario a través de TagsAction.class. • https://github.com/GHA193/Vulns/blob/main/lmxcms%20injection.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

02 Nov 2023 — An issue in lmxcms v.1.41 allows a remote attacker to execute arbitrary code via a crafted script to the admin.php file. Un problema en lmxcms v.1.41 permite a un atacante remoto ejecutar código arbitrario a través de un script manipulado en el archivo admin.php. • http://lmxcms.com • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

17 Sep 2023 — A vulnerability was found in lmxcms up to 1.41. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument lid leads to sql injection. VDB-239858 is the identifier assigned to this vulnerability. • https://vuldb.com/?ctiid.239858 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

13 Apr 2023 — lmxcms v1.4.1 was discovered to contain a SQL injection vulnerability via the setbook parameter at index.php. • https://github.com/jspring996/PHPcodecms/issues/3 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

10 Mar 2023 — A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.222728 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

10 Mar 2023 — A vulnerability has been found in lmxcms 1.41 and classified as critical. Affected by this vulnerability is the function update of the file AcquisiAction.class.php. The manipulation of the argument id with the input -1 and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.222727 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

01 Feb 2023 — lmxcms v1.41 was discovered to contain an arbitrary file deletion vulnerability via BackdbAction.class.php. • https://www.yuque.com/litanhua-fost9/hu05qa/izexczwp01w5c68i?singleDoc • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

01 Feb 2023 — lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php. • https://www.yuque.com/litanhua-fost9/hu05qa/gp3psgfdt1czpf45?singleDoc • CWE-552: Files or Directories Accessible to External Parties •