Show filters
36 Total Results
Displaying 1-10 of 36
Sort by:
Attacker Value
Unknown

CVE-2022-4974

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Attacker Value
Unknown

CVE-2023-4493

Disclosure Date: October 04, 2023 (last updated October 09, 2023)
Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a remote attacker to store a malicious JavaScript payload in the application to be executed when the page is loaded, resulting in an integrity impact.
Attacker Value
Unknown

CVE-2023-4492

Disclosure Date: October 04, 2023 (last updated October 09, 2023)
Vulnerability in Easy Address Book Web Server 1.6 version, affecting the parameters (firstname, homephone, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate and workzip) of the /addrbook.ghp file, allowing an attacker to inject a JavaScript payload specially designed to run when the application is loaded
Attacker Value
Unknown

CVE-2023-4491

Disclosure Date: October 04, 2023 (last updated October 09, 2023)
Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine.
Attacker Value
Unknown

CVE-2014-125058

Disclosure Date: January 07, 2023 (last updated February 24, 2025)
A vulnerability was found in LearnMeSomeCodes project3 and classified as critical. This issue affects the function search_first_name of the file search.rb. The manipulation leads to sql injection. The patch is named d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217607. NOTE: Maintainer is aware of this issue as remarked in the source code.
Attacker Value
Unknown

CVE-2020-29474

Disclosure Date: December 24, 2020 (last updated February 22, 2025)
EGavilan Media EGM Address Book 1.0 contains a SQL injection vulnerability. An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution.
Attacker Value
Unknown

CVE-2020-35276

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
EgavilanMedia ECM Address Book 1.0 is affected by SQL injection. An attacker can bypass the Admin Login panel through SQLi and get Admin access and add or remove any user.
Attacker Value
Unknown

CVE-2019-15770

Disclosure Date: August 29, 2019 (last updated November 27, 2024)
The woo-address-book plugin before 1.6.0 for WordPress has save calls without nonce verification checks.
0
Attacker Value
Unknown

CVE-2013-1748

Disclosure Date: April 18, 2013 (last updated October 05, 2023)
Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) edit.php or (2) import.php. NOTE: the view.php id vector is already covered by CVE-2008-2565.1 and the edit.php id vector is already covered by CVE-2008-2565.2.
0
Attacker Value
Unknown

CVE-2013-1749

Disclosure Date: April 18, 2013 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in edit.php in PHP Address Book 8.2.5 allows user-assisted remote attackers to inject arbitrary web script or HTML via the Address field.
0