Filtered by vendor B2evolution
Subscriptions
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-44036 | 1 B2evolution | 1 B2evolution Cms | 2024-11-21 | 7.2 High |
In b2evolution 7.2.5, if configured with admins_can_manipulate_sensitive_files, arbitrary file upload is allowed for admins, leading to command execution. NOTE: the vendor's position is that this is "very obviously a feature not an issue and if you don't like that feature it is very obvious how to disable it." | ||||
CVE-2022-30935 | 1 B2evolution | 1 B2evolution | 2024-11-21 | 9.1 Critical |
An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well. | ||||
CVE-2021-31632 | 1 B2evolution | 1 B2evolution Cms | 2024-11-21 | 9.8 Critical |
b2evolution CMS v7.2.3 was discovered to contain a SQL injection vulnerability via the parameter cfqueryparam in the User login section. This vulnerability allows attackers to execute arbitrary code via a crafted input. | ||||
CVE-2021-31631 | 1 B2evolution | 1 B2evolution Cms | 2024-11-21 | 8.8 High |
b2evolution CMS v7.2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the User login page. This vulnerability allows attackers to escalate privileges. | ||||
CVE-2021-28242 | 1 B2evolution | 1 B2evolution | 2024-11-21 | 8.8 High |
SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab. | ||||
CVE-2020-22841 | 1 B2evolution | 1 B2evolution | 2024-11-21 | 4.8 Medium |
Stored XSS in b2evolution CMS version 6.11.6 and prior allows an attacker to perform malicious JavaScript code execution via the plugin name input field in the plugin module. | ||||
CVE-2020-22840 | 1 B2evolution | 1 B2evolution | 2024-11-21 | 6.1 Medium |
Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php. | ||||
CVE-2020-22839 | 1 B2evolution | 1 B2evolution Cms | 2024-11-21 | 6.1 Medium |
Reflected cross-site scripting vulnerability (XSS) in the evoadm.php file in b2evolution cms version 6.11.6-stable allows remote attackers to inject arbitrary webscript or HTML code via the tab3 parameter. | ||||
CVE-2017-5553 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL. | ||||
CVE-2017-5539 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists. | ||||
CVE-2017-5494 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in the file types table in b2evolution through 6.8.3 allow remote authenticated users to inject arbitrary web script or HTML via a .swf file in a (1) comment frame or (2) avatar frame. | ||||
CVE-2017-5480 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Directory traversal vulnerability in inc/files/files.ctrl.php in b2evolution through 6.8.3 allows remote authenticated users to read or delete arbitrary files by leveraging back-office access to provide a .. (dot dot) in the fm_selected array parameter. | ||||
CVE-2017-1000423 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
b2evolution version 6.6.0 - 6.8.10 is vulnerable to input validation (backslash and single quote escape) in basic install functionality resulting in unauthenticated attacker gaining PHP code execution on the victim's setup. | ||||
CVE-2016-9479 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request. | ||||
CVE-2016-8901 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
b2evolution 6.7.6 suffer from an Object Injection vulnerability in /htsrv/call_plugin.php. | ||||
CVE-2016-7150 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the site name. | ||||
CVE-2016-7149 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in b2evolution 6.7.5 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors related to the autolink function. | ||||
CVE-2014-9599 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in the filemanager in b2evolution before 5.2.1 allows remote attackers to inject arbitrary web script or HTML via the fm_filter parameter to blogs/admin.php. | ||||
CVE-2013-7352 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in blogs/admin.php in b2evolution before 4.1.7 allows remote attackers to hijack the authentication of administrators for requests that conduct SQL injection attacks via the show_statuses[] parameter, related to CVE-2013-2945. | ||||
CVE-2013-2945 | 1 B2evolution | 1 B2evolution | 2024-11-21 | N/A |
SQL injection vulnerability in blogs/admin.php in b2evolution before 4.1.7 allows remote authenticated administrators to execute arbitrary SQL commands via the show_statuses[] parameter. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands. |