PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 1825

of 92

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Floriangaerber
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Php
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Php to page project
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily.

Published:   Updated:

Vulnerability Type: Cross site request forgery (csrf)

Vendor(s):  Wpfactory
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.7. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save code snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Projectworlds
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Projectworlds
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Projectworlds
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Phpjabbers
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Phpjabbers PHP Shopping Cart 4.2 is vulnerable to SQL Injection via the id parameter.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Msaad1999
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'selector' parameter in '/reset-password'.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Msaad1999
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'validator' parameter in '/reset-password'.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Exam form submission in php with source code project
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote attacker to escalate privileges via the val-username parameter in /index.php.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Hitreach
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.4

The Allow PHP in Posts and Pages plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 3.0.4 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Superstorefinder
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

SQL injection vulnerability in Super Store Finder PHP Script v.3.6 allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Php-fusion
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Due to an out-of-date dependency in the “Fusion File Manager” component accessible through the admin panel, an attacker can send a crafted request that allows them to read the contents of files on the system accessible within the privileges of the running process. Additionally, they may write files to arbitrary locations, provided the files pass the application’s mime-type and file extension validation.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Php-fusion
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Phpjabbers
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

phpjabbers PHP Forum Script 3.0 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Mongodb
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Some MongoDB Drivers may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when specific authentication-related commands are executed. Without due care, an application may inadvertently expose this sensitive information, e.g., by writing it to a log file. This issue only arises if an application enables the command listener feature (this is not enabled by default). This issue affects the MongoDB C Driver 1.0.0 prior to 1.17.7, MongoDB PHP Driver 1.0.0 prior to 1.9.2, MongoDB Swift Driver 1.0.0 prior to 1.1.1, MongoDB Node.js Driver 3.6 prior to 3.6.10, MongoDB Node.js Driver 4.0 prior to 4.17.0 and MongoDB Node.js Driver 5.0 prior to 5.8.0. This issue also affects users of the MongoDB C++ Driver dependent on the C driver 1.0.0 prior to 1.17.7 (C++ driver prior to 3.7.0).

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Mohammad-ajazuddin
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

SQL Injection vulnerability in eVotingSystem-PHP v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the user input fields.

Published:   Updated:

Vulnerability Type: Stack overflow

Vendor(s):  Debian, Fedoraproject, Php
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.

Published:   Updated:

Vulnerability Type: Xxe

Vendor(s):  Debian, Fedoraproject, Php
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.

of 92