Vulnerabilities (CVE)

Filtered by vendor Mingsoft Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-50578 1 Mingsoft 1 Mcms 2024-01-08 N/A 9.8 CRITICAL
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
CVE-2021-46384 1 Mingsoft 1 Mcms 2022-07-12 7.5 HIGH 9.8 CRITICAL
https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
CVE-2021-46063 1 Mingsoft 1 Mcms 2022-07-12 6.4 MEDIUM 9.1 CRITICAL
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
CVE-2022-31943 1 Mingsoft 1 Mcms 2022-07-11 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.
CVE-2022-30506 1 Mingsoft 1 Mcms 2022-06-10 7.5 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability was discovered in MCMS 5.2.7, allowing an attacker to execute arbitrary code through a crafted ZIP file.
CVE-2022-30048 1 Mingsoft 1 Mcms 2022-05-20 7.5 HIGH 9.8 CRITICAL
Mingsoft MCMS 5.2.7 was discovered to contain a SQL injection vulnerability in /mdiy/dict/list URI via orderBy parameter.
CVE-2022-30047 1 Mingsoft 1 Mcms 2022-05-20 7.5 HIGH 9.8 CRITICAL
Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability in /mdiy/dict/listExcludeApp URI via orderBy parameter.
CVE-2022-27466 1 Mingsoft 1 Mcms 2022-05-10 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.27 was discovered to contain a SQL injection vulnerability in the orderBy parameter at /dict/list.do.
CVE-2021-46036 1 Mingsoft 1 Mcms 2022-02-25 7.5 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code.
CVE-2021-44868 1 Mingsoft 1 Mcms 2022-02-25 7.5 HIGH 9.8 CRITICAL
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
CVE-2021-46386 1 Mingsoft 1 Mcms 2022-02-02 7.5 HIGH 9.8 CRITICAL
https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: File Upload. The impact is: execute arbitrary code (remote). The component is: net.mingsoft.basic.action.web.FileAction#upload. The attack vector is: jspx webshell. ¶¶ MCMS has a file upload vulnerability through which attacker can upload a webshell. Successful attacks of this vulnerability can result in takeover of MCMS
CVE-2022-23315 1 Mingsoft 1 Mcms 2022-01-26 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.
CVE-2022-23314 1 Mingsoft 1 Mcms 2022-01-26 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.
CVE-2022-22930 1 Mingsoft 1 Mcms 2022-01-26 7.5 HIGH 9.8 CRITICAL
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
CVE-2022-22929 1 Mingsoft 1 Mcms 2022-01-26 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file.
CVE-2022-22928 1 Mingsoft 1 Mcms 2022-01-26 7.5 HIGH 9.8 CRITICAL
MCMS v5.2.4 was discovered to have a hardcoded shiro-key, allowing attackers to exploit the key and execute arbitrary code.
CVE-2020-23262 1 Mingsoft 1 Mcms 2021-01-30 7.5 HIGH 9.8 CRITICAL
An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do.
CVE-2018-18830 1 Mingsoft 1 Mcms 2018-12-11 7.5 HIGH 9.8 CRITICAL
An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code.