Filtered by vendor Wuzhicms Subscriptions
Total 54 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2020-19897 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 6.1 Medium
A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter.
CVE-2020-19770 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 5.4 Medium
A cross-site scripting (XSS) vulnerability in the system bulletin component of WUZHI CMS v4.1.0 allows attackers to steal the admin's cookie.
CVE-2020-19553 1 Wuzhicms 1 Wuzhicms 2024-11-21 5.4 Medium
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
CVE-2020-19551 1 Wuzhicms 1 Wuzhicms 2024-11-21 8.8 High
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
CVE-2020-18877 1 Wuzhicms 1 Wuzhicms 2024-11-21 7.5 High
SQL Injection in Wuzhi CMS v4.1.0 allows remote attackers to obtain sensitive information via the 'flag' parameter in the component '/coreframe/app/order/admin/index.php'.
CVE-2020-18654 1 Wuzhicms 1 Wuzhicms 2024-11-21 6.1 Medium
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php".
CVE-2019-9110 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
XSS exists in WUZHI CMS 4.1.0 via index.php?m=content&f=postinfo&v=listing&set_iframe=[XSS] to coreframe/app/content/postinfo.php.
CVE-2019-9109 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
XSS exists in WUZHI CMS 4.1.0 via index.php?m=message&f=message&v=add&username=[XSS] to coreframe/app/message/message.php.
CVE-2019-9108 1 Wuzhicms 1 Wuzhicms 2024-11-21 N/A
XSS exists in WUZHI CMS 4.1.0 via index.php?m=core&f=map&v=baidumap&x=[XSS]&y=[XSS] to coreframe/app/core/map.php.
CVE-2019-9107 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
XSS exists in WUZHI CMS 4.1.0 via index.php?m=attachment&f=imagecut&v=init&imgurl=[XSS] to coreframe/app/attachment/imagecut.php.
CVE-2018-9927 1 Wuzhicms 1 Wuzhicms 2024-11-21 N/A
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can add a user account via index.php?m=member&f=index&v=add.
CVE-2018-9926 1 Wuzhicms 1 Wuzhicms 2024-11-21 N/A
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can add an admin account via index.php?m=core&f=power&v=add.
CVE-2018-20572 1 Wuzhicms 1 Wuzhicms 2024-11-21 N/A
WUZHI CMS 4.1.0 allows coreframe/app/coupon/admin/copyfrom.php SQL injection via the index.php?m=promote&f=index&v=search keywords parameter, a related issue to CVE-2018-15893.
CVE-2018-18938 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
An issue was discovered in WUZHI CMS 4.1.0. There is stored XSS in index.php?m=core&f=index via an ontoggle attribute to details/open/ within a second input field.
CVE-2018-18712 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can change the super administrator's username via index.php?m=member&f=index&v=edit&uid=1.
CVE-2018-18711 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can change the super administrator's password via index.php?m=core&f=panel&v=edit_info.
CVE-2018-17832 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
XSS exists in WUZHI CMS 2.0 via the index.php v or f parameter.
CVE-2018-17426 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
WUZHI CMS 4.1.0 has stored XSS via the "Extension module" "SMS in station" field under the index.php?m=core URI.
CVE-2018-17425 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 N/A
WUZHI CMS 4.1.0 has stored XSS via the "Membership Center" "I want to ask" "detailed description" field under the index.php?m=member URI.
CVE-2018-14512 1 Wuzhicms 1 Wuzhi Cms 2024-11-21 6.1 Medium
An XSS vulnerability was discovered in WUZHI CMS 4.1.0. There is persistent XSS that allows remote attackers to inject arbitrary web script or HTML via the form[nickname] parameter to the index.php?m=core&f=set&v=sendmail URI. When the administrator accesses the "system settings - mail server" screen, the XSS payload is triggered.