CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker to execute arbitrary code via a crafted get request. | 9.6 |
Critical |
||
Cross Site Scripting (XSS) in MiniCMS v1.10 allows remote attackers to execute arbitrary code by injecting commands via a crafted HTTP request to the component "/mc-admin/post-edit.php". | 6.1 |
Medium |
||
Directory traversal vulnerability in page_edit.php in MiniCMS V1.10 allows remote attackers to read arbitrary files via the state parameter. | 7.5 |
High |
||
Directory traversal vulnerability in post-edit.php in MiniCMS V1.10 allows remote attackers to include and execute arbitrary files via the state parameter. | 9.8 |
Critical |
||
In MiniCMS V1.10, stored XSS was found in mc-admin/conf.php (comment box), which can be used to get a user's cookie. | 4.8 |
Medium |
||
In MiniCMS V1.10, stored XSS was found in mc-admin/post-edit.php via the content box. An attacker can use it to get a user's cookie. This is different from CVE-2018-10296, CVE-2018-16233, CVE-2018-20520, and CVE-2019-13186. | 4.8 |
Medium |
||
In MiniCMS V1.10, stored XSS was found in mc-admin/page-edit.php (content box), which can be used to get a user's cookie. | 4.8 |
Medium |
||
In MiniCMS V1.10, stored XSS was found in mc-admin/post-edit.php via the tags box. An attacker can use it to get a user's cookie. This is different from CVE-2018-10296, CVE-2018-16233, and CVE-2018-20520. | 6.1 |
Medium |
||
MiniCMS 1.10 allows mc-admin/post.php?state=publish&delete= CSRF to delete articles, a different vulnerability than CVE-2018-18891. | 6.5 |
Medium |
||
MiniCMS V1.10 has XSS via the mc-admin/post-edit.php query string, a related issue to CVE-2018-10296 and CVE-2018-16233. | 6.1 |
Medium |
||
MiniCMS 1.10 allows full path disclosure via /mc-admin/post.php?state=delete&delete= with an invalid filename. | 5.3 |
Medium |
||
MiniCMS 1.10 allows file deletion via /mc-admin/post.php?state=delete&delete= because the authentication check occurs too late. | 7.5 |
High |
||
MiniCMS 1.10 allows execution of arbitrary PHP code via the install.php sitename parameter, which affects the site_name field in mc_conf.php. | 9.8 |
Critical |
||
MiniCMS 1.10, when Internet Explorer is used, allows XSS via a crafted URI because $_SERVER['REQUEST_URI'] is mishandled. | 6.1 |
Medium |
||
An issue was discovered in MiniCMS 1.10. There is an mc-admin/post.php?tag= XSS vulnerability for a state=delete, state=draft, or state=publish request. | 6.1 |
Medium |
||
MiniCMS V1.10 has XSS via the mc-admin/post-edit.php tags parameter. | 6.1 |
Medium |
||
An issue was discovered in MiniCMS 1.10. There is a post.php?date= XSS vulnerability. | 6.1 |
Medium |
||
mc-admin/post.php in MiniCMS 1.10 allows remote attackers to obtain a directory listing of the top-level directory of the web root via a link that becomes available after posting an article. | 2.7 |
Low |
||
mc-admin/post-edit.php in MiniCMS 1.10 allows full path disclosure via a modified id field. | 2.7 |
Low |
||
MiniCMS V1.10 has XSS via the mc-admin/post-edit.php title parameter. | 6.1 |
Medium |
||
MiniCMS v1.10 has XSS via the mc-admin/conf.php site_link parameter. | 5.4 |
Medium |
||
There is a CSRF vulnerability in mc-admin/conf.php in MiniCMS 1.10 that can change the administrator account password. | 8.8 |
High |