Filtered by vendor Mingsoft
Subscriptions
Filtered by product Mcms
Subscriptions
Total
45 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2021-46036 | 1 Mingsoft | 1 Mcms | 2024-11-21 | 9.8 Critical |
| An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code. | ||||
| CVE-2021-44868 | 1 Mingsoft | 1 Mcms | 2024-11-21 | 9.8 Critical |
| A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do | ||||
| CVE-2020-23262 | 1 Mingsoft | 1 Mcms | 2024-11-21 | 9.8 Critical |
| An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do. | ||||
| CVE-2018-18831 | 1 Mingsoft | 1 Mcms | 2024-11-21 | N/A |
| An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. | ||||
| CVE-2018-18830 | 1 Mingsoft | 1 Mcms | 2024-11-21 | N/A |
| An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code. | ||||