Lucene search

K
GxlcmsGxlcms

9 matches found

CVE
CVE
added 2018/07/28 11:29 p.m.48 views

CVE-2018-14685

The add function in www/Lib/Lib/Action/Admin/TplAction.class.php in Gxlcms v1.1.4 allows remote attackers to read arbitrary files via a crafted index.php?s=Admin-Tpl-ADD-id request, related to Lib/Common/Admin/function.php.

9.8CVSS9AI score0.00557EPSS
CVE
CVE
added 2017/10/03 1:29 a.m.40 views

CVE-2017-14979

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.

7.5CVSS7.5AI score0.00315EPSS
CVE
CVE
added 2018/08/08 12:29 a.m.34 views

CVE-2018-15177

In Gxlcms 2.0, a news/index.php?s=Admin-Admin-Insert CSRF attack can add an administrator account.

8.8CVSS8.6AI score0.00141EPSS
CVE
CVE
added 2018/10/18 9:29 p.m.32 views

CVE-2018-18487

In \lib\admin\action\dataaction.class.php in Gxlcms v2.0, the database backup filename generation uses mt_rand() unsafely, resulting in predictable database backup file locations.

7.5CVSS7.5AI score0.00316EPSS
CVE
CVE
added 2021/08/12 3:15 p.m.31 views

CVE-2020-20975

In \lib\admin\action\dataaction.class.php in Gxlcms v1.1, SQL Injection exists via the $filename parameter.

9.8CVSS9.8AI score0.00264EPSS
CVE
CVE
added 2018/09/05 8:29 p.m.30 views

CVE-2018-16437

Gxlcms 2.0 before bug fix 20180915 has Directory Traversal exploitable by an administrator.

4.9CVSS5.2AI score0.00835EPSS
CVE
CVE
added 2018/09/07 5:29 a.m.30 views

CVE-2018-16655

Gxlcms 1.0 has XSS via the PATH_INFO to gx/lib/ThinkPHP/Tpl/ThinkException.tpl.php.

6.1CVSS5.9AI score0.0024EPSS
CVE
CVE
added 2018/09/05 8:29 p.m.26 views

CVE-2018-16436

Gxlcms 2.0 before bug fix 20180915 has SQL Injection exploitable by an administrator.

7.2CVSS7.5AI score0.00265EPSS
CVE
CVE
added 2018/10/18 9:29 p.m.24 views

CVE-2018-18488

In \lib\admin\action\dataaction.class.php in Gxlcms v2.0, SQL Injection exists via the ids[] parameter.

9.8CVSS9.8AI score0.00264EPSS