Filtered by vendor Jtbc Subscriptions
Total 10 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2019-8433 1 Jtbc 1 Jtbc Php 2024-09-16 N/A
JTBC(PHP) 3.0.1.8 allows Arbitrary File Upload via the console/#/console/file/manage.php?type=list URI, as demonstrated by a .php file.
CVE-2018-18436 1 Jtbc 1 Jtbc Php 2024-09-16 8.8 High
JTBC(PHP) 3.0 allows CSRF for creating an account via the console/account/manage.php?type=action&action=add URI.
CVE-2018-19547 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
JTBC(PHP) 3.0.1.7 has XSS via the console/xml/manage.php?type=action&action=edit content parameter.
CVE-2018-19546 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
JTBC(PHP) 3.0.1.7 has CSRF via the console/xml/manage.php?type=action&action=edit URI, as demonstrated by an XSS payload in the content parameter.
CVE-2018-19327 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
An issue was discovered in JTBC(PHP) 3.0.1.7. aboutus/manage.php?type=action&action=add allows CSRF.
CVE-2018-17837 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
An issue was discovered in JTBC(PHP) 3.0.1.6. Arbitrary file deletion is possible via a /console/file/manage.php?type=action&action=delete&path=c%3A%2F substring.
CVE-2018-17838 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
An issue was discovered in JTBC(PHP) 3.0.1.6. Arbitrary file read operations are possible via a /console/#/console/file/manage.php?type=list&path=c:/ substring.
CVE-2018-17836 1 Jtbc 1 Jtbc Php 2024-08-05 N/A
An issue was discovered in JTBC(PHP) 3.0.1.6. It allows remote attackers to execute arbitrary PHP code by using a /console/file/manage.php?type=action&action=addfile&path=..%2F substring to upload, in conjunction with a multipart/form-data PHP payload.
CVE-2018-17429 1 Jtbc 1 Jtbc 2024-08-05 N/A
/console/account/manage.php?type=action&action=add in JTBC v3.0(C) has CSRF for adding an administrator account.
CVE-2019-9662 1 Jtbc 1 Jtbc Php 2024-08-04 N/A
An issue was discovered in JTBC(PHP) 3.0.1.8. Its cache management module is flawed. An arbitrary file ending in "inc.php" can be deleted via a console/cache/manage.php?type=action&action=batch&batch=delete&ids=../ substring.