Lucene search

K

6 matches found

CVE
CVE
added 2018/01/26 8:29 p.m.50 views

CVE-2017-14521

In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload.

8.8CVSS8.7AI score0.0383EPSS
CVE
CVE
added 2018/01/26 8:29 p.m.50 views

CVE-2017-14523

WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from the administrator as a self attack

7.5CVSS7.5AI score0.11226EPSS
CVE
CVE
added 2018/02/09 11:29 p.m.44 views

CVE-2018-1000062

WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbitrary script on an unsuspecting user's browser. This attack appear to be exploitable via Crafted ...

4.4CVSS4.7AI score0.00206EPSS
CVE
CVE
added 2018/01/26 8:29 p.m.42 views

CVE-2017-14522

In WonderCMS 2.3.1, the application's input fields accept arbitrary user input resulting in execution of malicious JavaScript. NOTE: the vendor disputes this issue stating that this is a feature that enables only a logged in administrator to write execute JavaScript anywhere on their website

6.1CVSS6.4AI score0.00427EPSS
CVE
CVE
added 2018/07/18 7:29 p.m.30 views

CVE-2018-14387

An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's acc...

8.8CVSS8.5AI score0.00346EPSS
CVE
CVE
added 2018/02/27 3:29 p.m.30 views

CVE-2018-7172

In index.php in WonderCMS before 2.4.1, remote attackers can delete arbitrary files via directory traversal.

5.5CVSS5.3AI score0.01368EPSS