Vulnerabilities (CVE)

Filtered by vendor Gxlcms Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-14979 1 Gxlcms 1 Gxlcms 2019-10-03 5.0 MEDIUM 7.5 HIGH
Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
CVE-2018-18487 1 Gxlcms 1 Gxlcms 2018-11-30 5.0 MEDIUM 7.5 HIGH
In \lib\admin\action\dataaction.class.php in Gxlcms v2.0, the database backup filename generation uses mt_rand() unsafely, resulting in predictable database backup file locations.
CVE-2018-16436 1 Gxlcms 1 Gxlcms 2018-11-05 6.5 MEDIUM 7.2 HIGH
Gxlcms 2.0 before bug fix 20180915 has SQL Injection exploitable by an administrator.
CVE-2018-15177 1 Gxlcms 1 Gxlcms 2018-10-05 6.8 MEDIUM 8.8 HIGH
In Gxlcms 2.0, a news/index.php?s=Admin-Admin-Insert CSRF attack can add an administrator account.
CVE-2018-9851 1 Gxlcms 1 Gxlcms Qy 2018-05-17 5.0 MEDIUM 7.5 HIGH
In Gxlcms QY v1.0.0713, Lib\Lib\Action\Admin\TplAction.class.php allows remote attackers to read any file via a modified pathname in an Admin-Tpl request, as demonstrated by use of '|' instead of '/' as a directory separator, in conjunction with a ".." sequence.
CVE-2018-9850 1 Gxlcms 1 Gxlcms Qy 2018-05-14 6.4 MEDIUM 7.5 HIGH
In Gxlcms QY v1.0.0713, Lib\Lib\Action\Admin\DataAction.class.php allows remote attackers to delete any file via directory traversal sequences in the id parameter of an Admin-Data-del request.