Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
basercms mail vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2016-4879
Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and previous versions allows remote malicious users to hijack the authentication of administrators via unspecified vectors.
Basercms Basercms
Basercms Mail
312
VMScore
CVE-2016-4877
Cross-site scripting vulnerability in baserCMS plugin Mail version 3.0.10 and previous versions allows remote authenticated malicious users to inject arbitrary web script or HTML via unspecified vectors.
Basercms Basercms 3.0.10
Basercms Mail 3.0.10
570
VMScore
CVE-2017-10843
baserCMS version 3.0.14 and previous versions, 4.0.5 and previous versions allows remote malicious users to delete arbitrary files via unspecified vectors when the "File" field is being used in the mail form.
Basercms Basercms
NA
CVE-2023-43792
baserCMS is a website development framework. In versions 4.6.0 up to and including 4.7.6, there is a Code Injection vulnerability in the mail form of baserCMS. As of time of publication, no known patched versions are available.
Basercms Basercms
445
VMScore
CVE-2018-0575
baserCMS (baserCMS 4.1.0.1 and previous versions versions, baserCMS 3.0.15 and previous versions versions) allows remote malicious users to bypass access restriction in mail form to view a file which is uploaded by a site user via unspecified vectors.
Basercms Basercms
605
VMScore
CVE-2016-4886
Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and previous versions allows remote malicious users to hijack the authentication of administrators via unspecified vectors.
Basercms Basercms 3.0.10
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started