Vulnerabilities (CVE)

Filtered by vendor Tribalsystems Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39578 1 Tribalsystems 1 Zenario 2023-08-29 N/A 4.8 MEDIUM
A stored cross-site scripting (XSS) vulnerability in the Create function of Zenario CMS v9.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu navigation text field.
CVE-2021-42171 1 Tribalsystems 1 Zenario 2022-05-24 6.5 MEDIUM 7.2 HIGH
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
CVE-2021-27673 1 Tribalsystems 1 Zenario 2022-05-23 3.5 LOW 4.8 MEDIUM
Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component.
CVE-2021-27672 1 Tribalsystems 1 Zenario 2021-04-21 4.0 MEDIUM 4.9 MEDIUM
SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component.
CVE-2021-26830 1 Tribalsystems 1 Zenario 2021-04-19 6.4 MEDIUM 9.1 CRITICAL
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
CVE-2018-5960 1 Tribalsystems 1 Zenario 2020-02-03 6.5 MEDIUM 8.8 HIGH
Zenario v7.1 - v7.6 has SQL injection via the `Name` input field of organizer.php or admin_boxes.ajax.php in the `Categories - Edit` module.
CVE-2018-18420 1 Tribalsystems 1 Zenario 2018-12-04 6.8 MEDIUM 8.8 HIGH
Cross-Site Request Forgery (CSRF) vulnerability was discovered in the 8.3 version of Zenario Content Management System via the admin/organizer.ajax.php?path=zenario__content%2Fpanels%2Fcontent URI.