Show filters
267 Total Results
Displaying 111-120 of 267
Sort by:
Attacker Value
Unknown

CVE-2023-2059

Disclosure Date: April 14, 2023 (last updated February 24, 2025)
A vulnerability was found in DedeCMS 5.7.87. It has been rated as problematic. Affected by this issue is some unknown functionality of the file uploads/include/dialog/select_templets.php. The manipulation leads to path traversal: '..\filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225944.
Attacker Value
Unknown

CVE-2023-2056

Disclosure Date: April 14, 2023 (last updated February 24, 2025)
A vulnerability was found in DedeCMS up to 5.7.87 and classified as critical. This issue affects the function GetSystemFile of the file module_main.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225941 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-23192

Disclosure Date: March 23, 2023 (last updated February 24, 2025)
IS Decisions UserLock MFA 11.01 is vulnerable to authentication bypass using scheduled task.
Attacker Value
Unknown

CVE-2023-27709

Disclosure Date: March 16, 2023 (last updated February 24, 2025)
SQL injection vulnerability found in DedeCMS v.5.7.106 allows a remote attacker to execute arbitrary code via the rank_* parameter in the /dedestory_catalog.php endpoint.
Attacker Value
Unknown

CVE-2023-27707

Disclosure Date: March 16, 2023 (last updated February 24, 2025)
SQL injection vulnerability found in DedeCMS v.5.7.106 allows a remote attacker to execute arbitrary code via the rank_* parameter in the /dede/group_store.php endpoint.
Attacker Value
Unknown

CVE-2022-47595

Disclosure Date: March 14, 2023 (last updated February 24, 2025)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Go Maps (formerly WP Google Maps) plugin <= 9.0.15 versions.
Attacker Value
Unknown

CVE-2022-38778

Disclosure Date: February 08, 2023 (last updated February 24, 2025)
A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.
Attacker Value
Unknown

CVE-2022-4838

Disclosure Date: February 06, 2023 (last updated February 24, 2025)
The Clean Login WordPress plugin before 1.13.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Attacker Value
Unknown

CVE-2022-48140

Disclosure Date: February 02, 2023 (last updated February 24, 2025)
DedeCMS v5.7.97 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /file_manage_view.php?fmdo=edit&filename.
Attacker Value
Unknown

CVE-2022-23005

Disclosure Date: January 23, 2023 (last updated February 24, 2025)
Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details o…