Filtered by vendor B2evolution
Subscribe
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-44036 | 1 B2evolution | 1 B2evolution Cms | 2023-01-10 | N/A | 7.2 HIGH |
** DISPUTED ** In b2evolution 7.2.5, if configured with admins_can_manipulate_sensitive_files, arbitrary file upload is allowed for admins, leading to command execution. NOTE: the vendor's position is that this is "very obviously a feature not an issue and if you don't like that feature it is very obvious how to disable it." | |||||
CVE-2022-30935 | 1 B2evolution | 1 B2evolution | 2022-09-30 | N/A | 9.1 CRITICAL |
An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well. | |||||
CVE-2021-28242 | 1 B2evolution | 1 B2evolution | 2022-05-03 | 6.5 MEDIUM | 8.8 HIGH |
SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab. | |||||
CVE-2021-31632 | 1 B2evolution | 1 B2evolution Cms | 2021-12-07 | 7.5 HIGH | 9.8 CRITICAL |
b2evolution CMS v7.2.3 was discovered to contain a SQL injection vulnerability via the parameter cfqueryparam in the User login section. This vulnerability allows attackers to execute arbitrary code via a crafted input. | |||||
CVE-2021-31631 | 1 B2evolution | 1 B2evolution Cms | 2021-12-07 | 6.8 MEDIUM | 8.8 HIGH |
b2evolution CMS v7.2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the User login page. This vulnerability allows attackers to escalate privileges. | |||||
CVE-2020-22840 | 1 B2evolution | 1 B2evolution | 2021-02-17 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php. | |||||
CVE-2020-22841 | 1 B2evolution | 1 B2evolution | 2021-02-17 | 3.5 LOW | 4.8 MEDIUM |
Stored XSS in b2evolution CMS version 6.11.6 and prior allows an attacker to perform malicious JavaScript code execution via the plugin name input field in the plugin module. | |||||
CVE-2020-22839 | 1 B2evolution | 1 B2evolution Cms | 2021-02-12 | 4.3 MEDIUM | 6.1 MEDIUM |
Reflected cross-site scripting vulnerability (XSS) in the evoadm.php file in b2evolution cms version 6.11.6-stable allows remote attackers to inject arbitrary webscript or HTML code via the tab3 parameter. | |||||
CVE-2017-5539 | 1 B2evolution | 1 B2evolution | 2019-10-02 | 9.0 HIGH | 9.1 CRITICAL |
The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists. | |||||
CVE-2016-8901 | 1 B2evolution | 1 B2evolution | 2019-05-28 | 7.5 HIGH | 9.8 CRITICAL |
b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php. | |||||
CVE-2006-6417 | 1 B2evolution | 1 B2evolution | 2018-10-17 | 7.5 HIGH | N/A |
PHP remote file inclusion vulnerability in inc/CONTROL/import/import-mt.php in b2evolution 1.8.5 through 1.9 beta allows remote attackers to execute arbitrary PHP code via a URL in the inc_path parameter. | |||||
CVE-2006-6197 | 1 B2evolution | 1 B2evolution | 2018-10-17 | 6.8 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in b2evolution 1.8.2 through 1.9 beta allow remote attackers to inject arbitrary web script or HTML via the (1) app_name parameter in (a) _404_not_found.page.php, (b) _410_stats_gone.page.php, and (c) _referer_spam.page.php in inc/VIEW/errors/; the (2) baseurl parameter in (d) inc/VIEW/errors/_404_not_found.page.php; and the (3) ReqURI parameter in (e) inc/VIEW/errors/_referer_spam.page.php. | |||||
CVE-2007-2681 | 1 B2evolution | 1 B2evolution | 2018-10-16 | 7.5 HIGH | N/A |
Directory traversal vulnerability in blogs/index.php in b2evolution 1.6 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the core_subdir parameter. | |||||
CVE-2007-2358 | 1 B2evolution | 1 B2evolution | 2018-10-16 | 7.5 HIGH | N/A |
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in b2evolution allow remote attackers to execute arbitrary PHP code via a URL in the (1) inc_path parameter to (a) a_noskin.php, (b) a_stub.php, (c) admin.php, (d) contact.php, (e) default.php, (f) index.php, and (g) multiblogs.php in blogs/; the (2) view_path and (3) control_path parameters to blogs/admin.php; and the (4) skins_path parameter to (h) blogs/contact.php and (i) blogs/multiblogs.php. NOTE: this issue is disputed by CVE, since the inc_path, view_path, control_path, and skins_path variables are all initialized in conf/_advanced.php before they are used. | |||||
CVE-2017-1000423 | 1 B2evolution | 1 B2evolution | 2018-01-17 | 7.5 HIGH | 9.8 CRITICAL |
b2evolution version 6.6.0 - 6.8.10 is vulnerable to input validation (backslash and single quote escape) in basic install functionality resulting in unauthenticated attacker gaining PHP code execution on the victim's setup. | |||||
CVE-2014-9599 | 1 B2evolution | 1 B2evolution | 2017-09-07 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php. | |||||
CVE-2013-2945 | 1 B2evolution | 1 B2evolution | 2017-08-28 | 6.5 MEDIUM | N/A |
SQL injection vulnerability in blogs/admin.php in b2evolution before 4.1.7 allows remote authenticated administrators to execute arbitrary SQL commands via the show_statuses[] parameter. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands. | |||||
CVE-2012-5911 | 1 B2evolution | 1 B2evolution | 2017-08-28 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in blogs/blog1.php in b2evolution 4.1.3 allows remote attackers to inject arbitrary web script or HTML via the message body. | |||||
CVE-2012-5910 | 1 B2evolution | 1 B2evolution | 2017-08-28 | 6.5 MEDIUM | N/A |
SQL injection vulnerability in blogs/htsrv/viewfile.php in b2evolution 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via the root parameter. | |||||
CVE-2009-1657 | 1 B2evolution | 2 B2evolution, Starrating Plugin | 2017-08-16 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in the Starrating plugin before 0.7.7 for b2evolution allow remote attackers to execute arbitrary SQL commands via unspecified vectors. |