Show filters
16 Total Results
Displaying 1-10 of 16
Sort by:
Attacker Value
Moderate
CVE-2020-8644
Disclosure Date: February 05, 2020 (last updated February 21, 2025)
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
0
Attacker Value
Unknown
CVE-2024-8880
Disclosure Date: September 16, 2024 (last updated September 21, 2024)
A vulnerability classified as critical has been found in playSMS 1.4.4/1.4.5/1.4.6/1.4.7. Affected is an unknown function of the file /playsms/index.php?app=main&inc=core_auth&route=forgot&op=forgot of the component Template Handler. The manipulation of the argument username/email/captcha leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The project maintainer was informed early about the issue. Investigation shows that playSMS up to 1.4.3 contained a fix but later versions re-introduced the flaw. As long as the latest version of the playsms/tpl package is used, the software is not affected. Version >=1.4.4 shall fix this issue for sure.
0
Attacker Value
Unknown
CVE-2024-6470
Disclosure Date: July 03, 2024 (last updated July 04, 2024)
A vulnerability was found in playSMS 1.4.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php?app=main&inc=feature_inboxgroup&op=list of the component Template Handler. The manipulation of the argument Receiver Number with the input {{`id`}} leads to injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-270278 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-6469
Disclosure Date: July 03, 2024 (last updated July 06, 2024)
A vulnerability was found in playSMS 1.4.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php?app=main&inc=feature_firewall&op=firewall_list of the component Template Handler. The manipulation of the argument IP address with the input {{`id`} leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-270277 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-6251
Disclosure Date: June 22, 2024 (last updated September 20, 2024)
A vulnerability, which was classified as problematic, was found in playSMS 1.4.3. Affected is an unknown function of the file /index.php?app=main&inc=feature_phonebook&op=phonebook_list of the component New Phonebook Handler. The manipulation of the argument name/email leads to basic cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269418 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-5851
Disclosure Date: June 11, 2024 (last updated June 12, 2024)
A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible.
0
Attacker Value
Unknown
CVE-2022-47034
Disclosure Date: February 13, 2023 (last updated October 08, 2023)
A type juggling vulnerability in the component /auth/fn.php of PlaySMS v1.4.5 and earlier allows attackers to bypass authentication.
0
Attacker Value
Unknown
CVE-2021-40373
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI.
0
Attacker Value
Unknown
CVE-2020-15018
Disclosure Date: June 24, 2020 (last updated February 21, 2025)
playSMS through 1.4.3 is vulnerable to session fixation.
0
Attacker Value
Unknown
CVE-2018-18387
Disclosure Date: October 29, 2018 (last updated November 27, 2024)
playSMS through 1.4.2 allows Privilege Escalation through Daemon abuse.
0