Ghostxbh

Uzy-ssm-mall

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 08.10.2025 00:00:00
  • Zuletzt bearbeitet 10.10.2025 16:16:13

An XML External Entity (XXE) vulnerability in the /mall/wxpay/pay component of uzy-ssm-mall v1.1.0 allows attackers to execute arbitrary code via supplying crafted XML data.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 08.10.2025 00:00:00
  • Zuletzt bearbeitet 10.10.2025 16:16:03

A fastjson deserialization vulnerability in uzy-ssm-mall v1.1.0 allows attackers to execute arbitrary code via supplying a crafted input.

Exploit
  • EPSS 0.23%
  • Veröffentlicht 14.04.2025 10:15:14
  • Zuletzt bearbeitet 10.10.2025 17:08:19

A vulnerability was found in ghostxbh uzy-ssm-mall 1.0.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 14.04.2025 09:31:07
  • Zuletzt bearbeitet 10.10.2025 17:08:47

A vulnerability was found in ghostxbh uzy-ssm-mall 1.0.0 and classified as problematic. This issue affects some unknown processing of the file /product. The manipulation of the argument product_name leads to cross site scripting. The attack may be in...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 14.04.2025 09:15:14
  • Zuletzt bearbeitet 10.10.2025 17:11:11

A vulnerability has been found in ghostxbh uzy-ssm-mall 1.0.0 and classified as critical. This vulnerability affects the function ForeProductListController of the file /mall/product/0/20. The manipulation of the argument orderBy leads to sql injectio...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 14.04.2025 08:31:06
  • Zuletzt bearbeitet 10.10.2025 17:15:14

A vulnerability, which was classified as critical, was found in ghostxbh uzy-ssm-mall 1.0.0. This affects an unknown part of the file /mall/user/uploadUserHeadImage. The manipulation of the argument File leads to unrestricted upload. It is possible t...