Show filters
35 Total Results
Displaying 11-20 of 35
Sort by:
Attacker Value
Unknown

CVE-2022-27158

Disclosure Date: April 15, 2022 (last updated February 23, 2025)
pearweb < 1.32 suffers from Deserialization of Untrusted Data.
Attacker Value
Unknown

CVE-2022-27157

Disclosure Date: April 15, 2022 (last updated February 23, 2025)
pearweb < 1.32 is suffers from a Weak Password Recovery Mechanism via include/users/passwordmanage.php.
Attacker Value
Unknown

CVE-2022-23903

Disclosure Date: March 29, 2022 (last updated February 23, 2025)
A Cross Site Scripting (XSS) vulnerability exists in pearadmin pear-admin-think <=5.0.6, which allows a login account to access arbitrary functions and cause stored XSS through a fake User-Agent.
Attacker Value
Unknown

CVE-2021-29377

Disclosure Date: August 12, 2021 (last updated February 23, 2025)
Pear Admin Think through 2.1.2 has an arbitrary file upload vulnerability that allows attackers to execute arbitrary code remotely. A .php file can be uploaded via admin.php/index/upload because app/common/service/UploadService.php mishandles fileExt.
Attacker Value
Unknown

CVE-2020-11084

Disclosure Date: July 14, 2020 (last updated February 21, 2025)
In iPear, the manual execution of the eval() function can lead to command injection. Only PCs where commands are manually executed via "For Developers" are affected. This function allows executing any PHP code within iPear which may change, damage, or steal data (files) from the PC.
Attacker Value
Unknown

CVE-2018-1000888

Disclosure Date: December 28, 2018 (last updated November 27, 2024)
PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, is_file, is_dir, etc). When extract is called without a specific prefix path, we can trigger unserialization by crafting a tar file with `phar://[path_to_malicious_phar_file]` as path. Object injection can be used to trigger destruct in the loaded PHP classes, e.g. the Archive_Tar class itself. With Archive_Tar object injection, arbitrary file deletion can occur because `@unlink($this->_temp_tarname)` is called. If another class with useful gadget is loaded, it may possible to cause remote code execution that can result in files being deleted or possibly modified. This vulnerability appears to have been fixed in 1.4.4.
0
Attacker Value
Unknown

CVE-2017-5630

Disclosure Date: February 01, 2017 (last updated November 25, 2024)
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Attacker Value
Unknown

CVE-2015-7299

Disclosure Date: October 21, 2015 (last updated October 05, 2023)
SQL injection vulnerability in Runtime/Runtime/AjaxCall.ashx in K2 blackpearl, smartforms, and K2 for SharePoint 4.6.7 allows remote attackers to execute arbitrary SQL commands via the xml parameter.
0
Attacker Value
Unknown

CVE-2011-1144

Disclosure Date: March 03, 2011 (last updated October 04, 2023)
The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072.
0
Attacker Value
Unknown

CVE-2011-1072

Disclosure Date: March 03, 2011 (last updated October 04, 2023)
The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
0