CMS Made Simple version 2.2.5 has Remote Code Execution vulnerability in File Manager, allowing authenticated admin to execute code on the server via file upload
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CMS Made Simple 2.2.5 - (Authenticated) Remote Code Execution | 4 Jul 201800:00 | – | exploitpack |
![]() | Remote code execution | 13 Mar 201801:29 | – | prion |
![]() | CMS Made Simple 2.2.5 Authenticated Remote Command Execution | 19 Jul 201800:00 | – | packetstorm |
![]() | CMS Made Simple 2.2.5 Remote Code Execution | 4 Jul 201800:00 | – | packetstorm |
![]() | CMS Made Simple 2.2.5 - (Authenticated) Remote Code Execution | 4 Jul 201800:00 | – | exploitdb |
![]() | CVE-2018-1000094 | 13 Mar 201801:29 | – | cve |
![]() | CMS Made Simple File Manager Remote Code Execution (CVE-2018-1000094) | 9 Jul 201800:00 | – | checkpoint_advisories |
![]() | CVE-2018-1000094 | 13 Mar 201801:00 | – | cvelist |
![]() | CMS Made Simple Authenticated RCE via File Upload/Copy | 17 Jul 201814:00 | – | metasploit |
Source | Link |
---|---|
exploit-db | www.exploit-db.com/exploits/44976/ |
dev | www.dev.cmsmadesimple.org/bug/view/11741 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo