Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29725 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file. | |||||
CVE-2018-16250 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
The "utilisateur" menu in Creatiwity wityCMS 0.6.2 modifies the presence of XSS at two input points for user information, with the "first name" and "last name" parameters. | |||||
CVE-2018-16251 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 4.0 MEDIUM | 4.3 MEDIUM |
A "search for user discovery" injection issue exists in Creatiwity wityCMS 0.6.2 via the "Utilisateur" menu. No input parameters are filtered, e.g., the /admin/user/users Nickname, email, firstname, lastname, and groupe parameters. | |||||
CVE-2018-16776 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
wityCMS 0.6.2 has XSS via the "Site Name" field found in the "Contact" "Configuration" page. | |||||
CVE-2018-14029 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
CSRF vulnerability in admin/user/edit in Creatiwity wityCMS 0.6.2 allows an attacker to take over a user account, as demonstrated by modifying the account's email field. | |||||
CVE-2018-11512 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
Stored cross-site scripting (XSS) vulnerability in the "Website's name" field found in the "Settings" page under the "General" menu in Creatiwity wityCMS 0.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to admin/settings/general. | |||||
CVE-2018-12065 | 1 Creatiwity | 1 Witycms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A Local File Inclusion vulnerability in /system/WCore/WHelper.php in Creatiwity wityCMS 0.6.2 allows remote attackers to include local PHP files (execute PHP code) or read non-PHP files by replacing a helper.json file. |