Search
Search Results (11 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-9795 | 1 Tianti Project | 1 Tianti | 2025-09-02 | 6.3 Medium |
A vulnerability has been found in xujeff tianti 天梯 up to 2.3. The impacted element is the function ajaxUploadFile of the file src/main/java/com/jeff/tianti/controller/UploadController.java. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | ||||
CVE-2025-8807 | 1 Tianti Project | 1 Tianti | 2025-08-12 | 6.3 Medium |
A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been declared as critical. This vulnerability affects unknown code of the file /tianti-module-admin/user/ajax/save. The manipulation leads to missing authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2025-8808 | 1 Tianti Project | 1 Tianti | 2025-08-12 | 4.3 Medium |
A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to csv injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2025-25908 | 1 Tianti Project | 1 Tianti | 2025-06-23 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability in tianti v2.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the coverImageURL parameter at /article/ajax/save. | ||||
CVE-2025-27910 | 1 Tianti Project | 1 Tianti | 2025-05-21 | 8 High |
tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/upd/status. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request. | ||||
CVE-2025-25907 | 1 Tianti Project | 1 Tianti | 2025-05-21 | 8.8 High |
tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/save. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request. | ||||
CVE-2018-19110 | 1 Tianti Project | 1 Tianti | 2024-11-21 | N/A |
The skin-management feature in tianti 2.3 allows remote authenticated users to bypass intended permission restrictions by visiting tianti-module-admin/user/skin/list directly because controller\usercontroller.java maps a /skin/list request to the function skinList, and lacks an authorization check. | ||||
CVE-2018-19109 | 1 Tianti Project | 1 Tianti | 2024-11-21 | N/A |
tianti 2.3 allows remote authenticated users to bypass intended permission restrictions by visiting tianti-module-admin/cms/column/list directly to read the column list page or edit a column. | ||||
CVE-2018-19091 | 1 Tianti Project | 1 Tianti | 2024-11-21 | N/A |
tianti 2.3 has reflected XSS in the user management module via the tianti-module-admin/user/list userName parameter. | ||||
CVE-2018-19090 | 1 Tianti Project | 1 Tianti | 2024-11-21 | N/A |
tianti 2.3 has stored XSS in the article management module via an article title. | ||||
CVE-2018-19089 | 1 Tianti Project | 1 Tianti | 2024-11-21 | N/A |
tianti 2.3 has stored XSS in the userlist module via the tianti-module-admin/user/ajax/save_role name parameter, which is mishandled in tianti-module-admin\src\main\webapp\WEB-INF\views\user\user_list.jsp. |
Page 1 of 1.