Widzialni

Pad Cms

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 30.09.2025 11:37:45
  • Zuletzt bearbeitet 26.11.2025 14:36:51

Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not ...

  • EPSS 0.04%
  • Veröffentlicht 30.09.2025 11:37:44
  • Zuletzt bearbeitet 26.11.2025 14:40:13

PAD CMS implements weak client-side brute-force protection by utilizing two cookies:  login_count and login_timeout. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force ...

  • EPSS 0.02%
  • Veröffentlicht 30.09.2025 11:37:44
  • Zuletzt bearbeitet 26.11.2025 14:40:55

PAD CMS is vulnerable to Cross-Site Request Forgery in reset password's functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send a POST request changing currently logged user's password to...

  • EPSS 0.27%
  • Veröffentlicht 30.09.2025 11:37:44
  • Zuletzt bearbeitet 26.11.2025 14:37:44

Due to client-controlled permission check parameter, PAD CMS's upload photo functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execu...

  • EPSS 0.05%
  • Veröffentlicht 30.09.2025 11:37:44
  • Zuletzt bearbeitet 26.11.2025 14:37:18

Improper neutralization of input provided by an authorized user in article positioning functionality allows for Blind SQL Injection attacks. This issue affects all 3 templates: www, bip and ww+bip. This product is End-Of-Life and producent will not ...

  • EPSS 0.27%
  • Veröffentlicht 30.09.2025 11:37:43
  • Zuletzt bearbeitet 26.11.2025 14:42:30

Due to client-controlled permission check parameter, PAD CMS's file upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execut...

  • EPSS 0.27%
  • Veröffentlicht 30.09.2025 11:37:43
  • Zuletzt bearbeitet 26.11.2025 14:42:14

Due to client-controlled permission check parameter, PAD CMS's photo upload functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can then be executed leading to Remote Code Execu...

  • EPSS 0.05%
  • Veröffentlicht 30.09.2025 11:37:43
  • Zuletzt bearbeitet 26.11.2025 14:41:54

PAD CMS is vulnerable to Reflected XSS in printing and save to PDF functionality. Malicious attacker can craft special URL, which will result in arbitrary JavaScript execution in victim's browser, when opened. This issue affects all 3 templates: www,...

  • EPSS 0.04%
  • Veröffentlicht 30.09.2025 11:37:43
  • Zuletzt bearbeitet 26.11.2025 14:41:41

PAD CMS improperly initializes parameter used for password recovery, which allows to change password for any user that did not use reset password functionality. This issue affects all 3 templates: www, bip and www+bip. This product is End-Of-Life an...