Vulnerabilities (CVE)

Filtered by vendor Publiccms Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3950 1 Publiccms 1 Publiccms 2023-12-28 N/A 6.1 MEDIUM
A vulnerability, which was classified as problematic, was found in sanluan PublicCMS. Affected is the function initLink of the file dwz.min.js of the component Tab Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a972dc9b1c94aea2d84478bf26283904c21e4ca2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213456.
CVE-2023-48204 1 Publiccms 1 Publiccms 2023-11-21 N/A 6.5 MEDIUM
An issue in PublicCMS v.4.0.202302.e allows a remote attacker to obtain sensitive information via the appToken and Parameters parameter of the api/method/getHtml component.
CVE-2022-29784 1 Publiccms 1 Publiccms 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java.
CVE-2018-17368 1 Publiccms 1 Publiccms 2019-10-03 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in PublicCMS V4.0.180825. For an invalid login attempt, the response length is different depending on whether the username is valid, which makes it easier to conduct brute-force attacks.
CVE-2018-12493 1 Publiccms 1 Publiccms 2019-05-02 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in PublicCMS V4.0.20180210. There is a "Directory Traversal" and "Arbitrary file read" vulnerability via an admin/cmsWebFile/list.html?path=../ URI.
CVE-2018-12494 1 Publiccms 1 Publiccms 2019-03-18 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in PublicCMS V4.0.20180210. There is a "Directory Traversal" and "Arbitrary file read" vulnerability via an admin/cmsTemplate/content.html?path=../ URI.
CVE-2018-18927 1 Publiccms 1 Publiccms 2018-12-11 3.5 LOW 4.8 MEDIUM
An issue was discovered in PublicCMS V4.0. It allows XSS by modifying the page_list "attached" attribute (which typically has 'class="icon-globe icon-large"' in its value), as demonstrated by an 'UPDATE sys_module SET attached = "[XSS]" WHERE id="page_list"' statement.