Show filters
596 Total Results
Displaying 111-120 of 596
Sort by:
Attacker Value
Unknown

CVE-2021-45281

Disclosure Date: February 07, 2022 (last updated February 23, 2025)
QuickBox Pro v2.4.8 contains a cross-site scripting (XSS) vulnerability at "adminuseredit.php?usertoedit=XSS", as the user supplied input for the value of this parameter is not properly sanitized.
Attacker Value
Unknown

CVE-2021-44981

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can use the sudo command within this shell_exec(''); function, which allows for privilege escalation by means of RCE.
Attacker Value
Unknown

CVE-2021-26795

Disclosure Date: November 14, 2021 (last updated February 23, 2025)
A SQL Injection vulnerability in /appliance/shiftmgn.php in TalariaX sendQuick Alert Plus Server Admin 4.3 before 8HF11 allows attackers to obtain sensitive information via a Roster Time to Roster Management.
Attacker Value
Unknown

CVE-2020-22876

Disclosure Date: July 13, 2021 (last updated February 23, 2025)
Buffer Overflow vulnerability in quickjs.c in QuickJS, allows remote attackers to cause denial of service. This issue is resolved in the 2020-07-05 release.
Attacker Value
Unknown

CVE-2020-35754

Disclosure Date: January 28, 2021 (last updated February 22, 2025)
OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.
Attacker Value
Unknown

CVE-2020-5674

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
Attacker Value
Unknown

CVE-2020-12333

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-13695

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.
Attacker Value
Unknown

CVE-2020-13694

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user can execute sudo mysql without a password, which means that the www-data user can execute arbitrary OS commands via the mysql -e option.
Attacker Value
Unknown

CVE-2020-13448

Disclosure Date: June 01, 2020 (last updated February 21, 2025)
QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8 allows an authenticated remote attacker to execute code on the server via command injection in the servicestart parameter.