Show filters
2,684 Total Results
Displaying 1-10 of 2,684
Sort by:
Attacker Value
Very High
CVE-2021-41649
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
3
Attacker Value
Low
CVE-2021-38759
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.
1
Attacker Value
Very High
CVE-2021-41648
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
2
Attacker Value
Very High
CVE-2021-38754
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
SQL Injection vulnerability in Hospital Management System due to lack of input validation in messearch.php.
2
Attacker Value
Unknown
CVE-2024-26148
Disclosure Date: February 21, 2024 (last updated February 26, 2025)
Querybook is a user interface for querying big data. Prior to version 3.31.1, there is a vulnerability in Querybook's rich text editor that enables users to input arbitrary URLs without undergoing necessary validation. This particular security flaw allows the use of `javascript:` protocol which can potentially trigger arbitrary client-side execution. The most extreme exploit of this flaw could occur when an admin user unknowingly clicks on a cross-site scripting URL, thereby unintentionally compromising admin role access to the attacker. A patch to rectify this issue has been introduced in Querybook version `3.31.1`. The fix is backward compatible and automatically fixes existing DataDocs. There are no known workarounds for this issue, except for manually checking each URL prior to clicking on them.
1
Attacker Value
Very Low
CVE-2022-0510
Disclosure Date: February 08, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in Packagist pimcore/pimcore prior to 10.3.1.
1
Attacker Value
Low
CVE-2021-39211
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI.
1
Attacker Value
Very High
CVE-2021-38757
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through contact.php.
1
Attacker Value
Moderate
CVE-2021-29449
Disclosure Date: April 14, 2021 (last updated February 22, 2025)
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.
1
Attacker Value
Moderate
CVE-2021-21324
Disclosure Date: March 08, 2021 (last updated February 22, 2025)
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on "Solutions". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with "Users" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you sh…
1