A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247908.
Max CVSS
7.2
EPSS Score
0.11%
Published
2023-12-13
Updated
2023-12-18
A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-06-14
Updated
2024-02-13
A vulnerability has been found in OTCMS up to 6.62 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file usersNews_deal.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231511.
Max CVSS
6.5
EPSS Score
0.06%
Published
2023-06-14
Updated
2024-02-13
A vulnerability, which was classified as problematic, was found in OTCMS up to 6.62. Affected is an unknown function of the file admin/readDeal.php?mudi=readQrCode. The manipulation of the argument img leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-231510 is the identifier assigned to this vulnerability.
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-06-14
Updated
2024-02-13
A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability.
Max CVSS
9.8
EPSS Score
0.06%
Published
2023-06-14
Updated
2024-02-13
A vulnerability classified as critical was found in OTCMS up to 6.62. This vulnerability affects unknown code. The manipulation of the argument username/password with the input admin leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231508.
Max CVSS
9.8
EPSS Score
0.06%
Published
2023-06-14
Updated
2024-02-13
A vulnerability classified as critical was found in OTCMS 6.0.1. Affected by this vulnerability is an unknown functionality of the file sysCheckFile.php?mudi=sql. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224749 was assigned to this vulnerability.
Max CVSS
9.8
EPSS Score
0.06%
Published
2023-04-02
Updated
2023-04-07
A vulnerability was found in OTCMS 6.72. It has been declared as problematic. Affected by this vulnerability is the function AutoRun of the file apiRun.php. The manipulation of the argument mode leads to cross site scripting. The attack can be launched remotely. The identifier VDB-224017 was assigned to this vulnerability.
Max CVSS
6.1
EPSS Score
0.06%
Published
2023-03-25
Updated
2023-03-30
A vulnerability was found in OTCMS 6.72. It has been classified as critical. Affected is the function UseCurl of the file /admin/info_deal.php of the component URL Parameter Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224016.
Max CVSS
9.8
EPSS Score
0.07%
Published
2023-03-25
Updated
2023-03-31
OTCMS v3.85 allows arbitrary PHP Code Execution because admin/sysCheckFile_deal.php blocks "into outfile" in a SELECT statement, but does not block the "into/**/outfile" manipulation. Therefore, the attacker can create a .php file.
Max CVSS
7.2
EPSS Score
0.13%
Published
2019-10-09
Updated
2021-07-21
OTCMS v3.85 has CSRF in the admin/member_deal.php Admin Panel page, leading to creation of a new management group account, as demonstrated by superadmin.
Max CVSS
6.5
EPSS Score
0.06%
Published
2019-10-09
Updated
2019-10-16
OTCMS 3.81 allows XSS via the mode parameter in an apiRun.php?mudi=autoRun request.
Max CVSS
6.1
EPSS Score
0.09%
Published
2019-07-19
Updated
2019-07-22
OTCMS 3.61 allows remote attackers to execute arbitrary PHP code via the accBackupDir parameter.
Max CVSS
8.1
EPSS Score
0.67%
Published
2018-09-23
Updated
2018-11-08
An issue was discovered in OTCMS 3.61. XSS exists in admin/share_switch.php via these parameters: fieldName fieldName2 tabName.
Max CVSS
6.1
EPSS Score
0.09%
Published
2018-09-16
Updated
2018-11-07
An issue was discovered in OTCMS 3.61. XSS exists in admin/users.php via these parameters: dataTypeCN dataMode dataModeStr.
Max CVSS
6.1
EPSS Score
0.09%
Published
2018-09-16
Updated
2018-11-07
OTCMS 3.20 allows XSS by adding a keyword or link to an article, as demonstrated by an admin/keyWord_deal.php?mudi=add request.
Max CVSS
6.1
EPSS Score
0.07%
Published
2018-03-24
Updated
2018-04-18
16 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!