Filtered by vendor Pluck-cms
Subscribe
Search
Total
7 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2020-20951 | 1 Pluck-cms | 1 Pluck | 2022-07-10 | 7.5 HIGH | 9.8 CRITICAL |
| In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files. | |||||
| CVE-2021-31746 | 1 Pluck-cms | 1 Pluck | 2021-12-14 | 7.5 HIGH | 9.8 CRITICAL |
| Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution. | |||||
| CVE-2019-1010062 | 1 Pluck-cms | 1 Pluckcms | 2019-10-09 | 7.5 HIGH | 9.8 CRITICAL |
| PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8. | |||||
| CVE-2019-11344 | 1 Pluck-cms | 1 Pluck | 2019-04-22 | 7.5 HIGH | 9.8 CRITICAL |
| data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. | |||||
| CVE-2018-11736 | 1 Pluck-cms | 1 Pluck | 2018-07-23 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Pluck before 4.7.7-dev2. /data/inc/images.php allows remote attackers to upload and execute arbitrary PHP code by using the image/jpeg content type for a .htaccess file. | |||||
| CVE-2018-11331 | 1 Pluck-cms | 1 Pluck | 2018-06-22 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess. | |||||
| CVE-2014-8708 | 1 Pluck-cms | 1 Pluck | 2017-03-20 | 7.5 HIGH | 9.8 CRITICAL |
| Pluck CMS 4.7.2 allows remote attackers to execute arbitrary code via the blog form feature. | |||||
