SQL injection through marking blog comments on bulk as spam in GitHub repository forkcms/forkcms prior to 5.11.1.
Max CVSS
9.0
EPSS Score
0.10%
Published
2022-03-25
Updated
2022-03-31
SQL Injection in GitHub repository forkcms/forkcms prior to 5.11.1.
Max CVSS
9.6
EPSS Score
0.07%
Published
2022-03-24
Updated
2022-03-29
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
Max CVSS
8.8
EPSS Score
0.10%
Published
2021-07-07
Updated
2021-07-12
PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code.
Max CVSS
8.8
EPSS Score
0.67%
Published
2021-03-04
Updated
2021-07-21
Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Fork before 5.8.3 allows remote attackers to perform unauthorized actions as administrator to (1) approve the mass of the user's comments, (2) restoring a deleted user, (3) installing or running modules, (4) resetting the analytics, (5) pinging the mailmotor api, (6) uploading things to the media library, (7) exporting locale.
Max CVSS
8.8
EPSS Score
0.09%
Published
2021-01-11
Updated
2021-07-12
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
Max CVSS
8.8
EPSS Score
0.09%
Published
2021-05-06
Updated
2021-05-12
Spoon Library through 2014-02-06, as used in Fork CMS before 1.4.1 and other products, allows PHP object injection via a cookie containing an object.
Max CVSS
9.8
EPSS Score
0.33%
Published
2019-08-26
Updated
2019-08-28
Multiple SQL injection vulnerabilities in Translations in Fork CMS before 3.8.6 allow remote authenticated users to execute arbitrary SQL commands via the (1) language[] or (2) type[] parameter to private/en/locale/index.
Max CVSS
7.5
EPSS Score
0.15%
Published
2015-02-06
Updated
2018-10-09
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!