
CVE-2023-7191 – S-CMS reg.php sql injection
https://notcve.org/view.php?id=CVE-2023-7191
31 Dec 2023 — A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. • https://note.zhaoj.in/share/Fmytf7wBINbP • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7190 – S-CMS sql injection
https://notcve.org/view.php?id=CVE-2023-7190
31 Dec 2023 — A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/0ZY7hEQAskqM • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7189 – S-CMS sql injection
https://notcve.org/view.php?id=CVE-2023-7189
31 Dec 2023 — A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. • https://note.zhaoj.in/share/9yaojoQvesLu • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2009-1502 – S-CMS 1.1 Stable - 'page' Local File Inclusion
https://notcve.org/view.php?id=CVE-2009-1502
01 May 2009 — Directory traversal vulnerability in plugin.php in S-Cms 1.1 Stable and 1.5.2 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the page parameter. Vulnerabilidad de salto de directorio transversal enplugin.php en S-Cms v1.1 Stable y v1.5.2 permite a atacantes remotos incluir y ejecutar archivos locales a su elección a través de secuencias de salto de directorio en el parámetro de página. • https://www.exploit-db.com/exploits/8566 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2009-0863 – S-CMS 1.1 Stable - Insecure Cookie Handling / Mass Page Delete
https://notcve.org/view.php?id=CVE-2009-0863
10 Mar 2009 — SQL injection vulnerability in admin/delete_page.php in S-Cms 1.1 Stable allows remote attackers to execute arbitrary SQL commands via the id parameter. Vulnerabilidad de inyección SQL en admin/delete_page.php en S-Cms Stable v1.1 permite a atacantes remotos ejecutar comandos SQL a través del parámetro "id". • https://www.exploit-db.com/exploits/8071 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2009-0864 – S-CMS 1.1 Stable - Insecure Cookie Handling / Mass Page Delete
https://notcve.org/view.php?id=CVE-2009-0864
10 Mar 2009 — S-Cms 1.1 Stable allows remote attackers to bypass authentication and obtain administrative access via an OK value for the login cookie. S-Cms 1.1 Stable permite a atacantes remotos evitar la autenticación y obtener acceso con privilegios de administrador a través de un valor "OK" para la cookie "login". • https://www.exploit-db.com/exploits/8071 • CWE-287: Improper Authentication •