CVE-2018-20775
admin/?/plugin/file_manager in Frog CMS 0.9.5 allows PHP code execution by creating a new .php file containing PHP code, and then visiting this file under the public/ URI.
Source: CVE-2018-20775
CVE-2018-20775
admin/?/plugin/file_manager in Frog CMS 0.9.5 allows PHP code execution by creating a new .php file containing PHP code, and then visiting this file under the public/ URI.
Source: CVE-2018-20775
CVE-2018-20778
admin/?/plugin/file_manager in Frog CMS 0.9.5 allows XSS by creating a new file containing a crafted attribute of an IMG element.
Source: CVE-2018-20778
CVE-2018-20776
Frog CMS 0.9.5 provides a directory listing for a /public request.
Source: CVE-2018-20776
CVE-2018-20777
Frog CMS 0.9.5 has XSS via the admin/?/snippet/edit/1 Body field.
Source: CVE-2018-20777
CVE-2018-20774
Frog CMS 0.9.5 has XSS via the admin/?/layout/edit/1 Body field.
Source: CVE-2018-20774
CVE-2018-20773
Frog CMS 0.9.5 allows PHP code execution by visiting admin/?/page/edit/1 and inserting additional <?php lines.
Source: CVE-2018-20773
CVE-2018-20772
Frog CMS 0.9.5 allows PHP code execution via <?php to the admin/?/layout/edit/1 URI.
Source: CVE-2018-20772
CVE-2019-7704
wasm::WasmBinaryBuilder::readUserSection in wasm-binary.cpp in Binaryen 1.38.22 triggers an attempt at excessive memory allocation, as demonstrated by wasm-merge and wasm-opt.
Source: CVE-2019-7704
CVE-2019-7703
In Binaryen 1.38.22, there is a use-after-free problem in wasm::WasmBinaryBuilder::visitCall in wasm-binary.cpp. Remote attackers could leverage this vulnerability to cause a denial-of-service via a wasm file, as demonstrated by wasm-merge.
Source: CVE-2019-7703