CVE-2023-51806
https://notcve.org/view.php?id=CVE-2023-51806
File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file. Vulnerabilidad de carga de archivos en Ujcms v.8.0.2 permite a un atacante local ejecutar código arbitrario a través de un archivo manipulado. • https://github.com/ujcms/ujcms https://github.com/ujcms/ujcms/issues/8 https://www.ujcms.com • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2023-51350
https://notcve.org/view.php?id=CVE-2023-51350
A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header. Un ataque de suplantación de identidad en ujcms v.8.0.2 permite a un atacante remoto obtener información confidencial y ejecutar código arbitrario a través de un script diseñado para la función X-Forwarded-For en el encabezado. • https://github.com/ujcms/ujcms https://github.com/ujcms/ujcms/issues/7 https://www.ujcms.com • CWE-290: Authentication Bypass by Spoofing •
CVE-2023-3231 – UJCMS ZIP Package information disclosure
https://notcve.org/view.php?id=CVE-2023-3231
A vulnerability has been found in UJCMS up to 6.0.2 and classified as problematic. This vulnerability affects unknown code of the component ZIP Package Handler. The manipulation of the argument dir leads to information disclosure. The attack can be initiated remotely. The complexity of an attack is rather high. • https://github.com/ujcms/ujcms/issues/6 https://vuldb.com/?ctiid.231502 https://vuldb.com/?id.231502 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-34747
https://notcve.org/view.php?id=CVE-2023-34747
File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload. • https://github.com/codeb0ss/CVE-2023-34747-PoC https://github.com/ujcms/ujcms/issues/4 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2023-34878
https://notcve.org/view.php?id=CVE-2023-34878
An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip. • https://github.com/ujcms/ujcms/issues/6 •