Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6159 | 1 Hans Oesterholt | 1 Cmme | 2018-10-11 | 5.0 MEDIUM | N/A |
Content Management Made Easy (CMME) 1.19 allows remote attackers to obtain system information via a direct request to info.php, which invokes the phpinfo function. | |||||
CVE-2008-3923 | 1 Hans Oesterholt | 1 Cmme | 2017-09-28 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in statistics.php in Content Management Made Easy (CMME) 1.12 allow remote attackers to inject arbitrary web script or HTML via the (1) page and (2) year parameters in an hstat_year action. | |||||
CVE-2008-3924 | 1 Hans Oesterholt | 1 Cmme | 2017-09-28 | 4.3 MEDIUM | N/A |
The "Make a backup" functionality in Content Management Made Easy (CMME) 1.12 stores sensitive information under the web root with insufficient access control, which allows remote attackers to discover (1) account names and (2) password hashes via a direct request for (a) backup/cmme_data.zip or (b) backup/cmme_cmme.zip. NOTE: it was later reported that vector a also affects CMME 1.19. | |||||
CVE-2008-3925 | 1 Hans Oesterholt | 1 Cmme | 2017-09-28 | 4.3 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in admin.php in Content Management Made Easy (CMME) 1.12 allows remote attackers to trigger the logout of an administrative user via a logout action. | |||||
CVE-2008-3926 | 1 Hans Oesterholt | 1 Cmme | 2017-09-28 | 5.8 MEDIUM | N/A |
Multiple directory traversal vulnerabilities in Content Management Made Easy (CMME) 1.12 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the env parameter in a weblog action to index.php, or (2) create arbitrary directories via a .. (dot dot) in the env parameter in a login action to admin.php. | |||||
CVE-2009-2342 | 1 Hans Oesterholt | 1 Cmme | 2009-07-07 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in admin.php (aka the login page) in Content Management Made Easy (CMME) before 1.22 allows remote attackers to inject arbitrary web script or HTML via the username field. |