Lucene search

K

7 matches found

CVE
CVE
added 2019/02/24 6:29 p.m.1186 views

CVE-2019-9082

ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.

9.3CVSS8.7AI score0.94141EPSS
CVE
CVE
added 2019/02/23 6:29 p.m.85 views

CVE-2019-9041

An issue was discovered in ZZZCMS zzzphp V1.6.1. In the inc/zzz_template.php file, the parserIfLabel() function's filtering is not strict, resulting in PHP code execution, as demonstrated by the if:assert substring.

7.2CVSS7.1AI score0.85674EPSS
CVE
CVE
added 2019/10/14 12:15 p.m.40 views

CVE-2019-17408

parserIfLabel in inc/zzz_template.php in ZZZCMS zzzphp 1.7.3 allows remote attackers to execute arbitrary code because the danger_key function can be bypassed via manipulations such as strtr.

9.8CVSS9.6AI score0.01969EPSS
CVE
CVE
added 2019/09/23 2:15 p.m.39 views

CVE-2019-16720

ZZZCMS zzzphp v1.7.2 does not properly restrict file upload in plugins/ueditor/php/controller.php?upfolder=news&action=catchimage, as demonstrated by uploading a .htaccess or .php5 file.

7.5CVSS7.5AI score0.00282EPSS
CVE
CVE
added 2019/03/30 1:29 p.m.38 views

CVE-2019-10647

ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if t...

9.8CVSS9.5AI score0.00806EPSS
CVE
CVE
added 2019/09/23 2:15 p.m.37 views

CVE-2019-16722

ZZZCMS zzzphp v1.7.2 has an insufficient protection mechanism against PHP Code Execution, because passthru bypasses an str_ireplace operation.

9.8CVSS9.5AI score0.03559EPSS
CVE
CVE
added 2019/02/26 7:29 a.m.28 views

CVE-2019-9182

There is a CSRF in ZZZCMS zzzphp V1.6.1 via a /admin015/save.php?act=editfile request. It allows PHP code injection by providing a filename in the file parameter, and providing file content in the filetext parameter.

8.8CVSS8.8AI score0.00145EPSS