Filtered by vendor Wondercms
Subscriptions
Filtered by product Wondercms
Subscriptions
Total
28 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-14522 | 1 Wondercms | 1 Wondercms | 2024-11-21 | 6.1 Medium |
In WonderCMS 2.3.1, the application's input fields accept arbitrary user input resulting in execution of malicious JavaScript. NOTE: the vendor disputes this issue stating that this is a feature that enables only a logged in administrator to write execute JavaScript anywhere on their website | ||||
CVE-2017-14521 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload. | ||||
CVE-2014-8705 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
PHP remote file inclusion vulnerability in editInplace.php in Wonder CMS 2014 allows remote attackers to execute arbitrary PHP code via a URL in the hook parameter. | ||||
CVE-2014-8704 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
Directory traversal vulnerability in index.php in Wonder CMS 2014 allows remote attackers to include and execute arbitrary local files via a crafted theme. | ||||
CVE-2014-8703 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in Wonder CMS 2014 allows remote attackers to inject arbitrary web script or HTML. | ||||
CVE-2014-8702 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
Wonder CMS 2014 allows remote attackers to obtain sensitive information by logging into the application with an array for the password, which reveals the installation path in an error message. | ||||
CVE-2014-8701 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
Wonder CMS 2014 allows remote attackers to obtain sensitive information by viewing /files/password, which reveals the unsalted MD5 hashed password. | ||||
CVE-2011-5317 | 1 Wondercms | 1 Wondercms | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in editText.php in WonderCMS before 0.4 allows remote attackers to inject arbitrary web script or HTML via the content parameter. |