Show filters
406 Total Results
Displaying 131-140 of 406
Sort by:
Attacker Value
Unknown
CVE-2022-45970
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board.
0
Attacker Value
Unknown
CVE-2022-45968
Disclosure Date: December 12, 2022 (last updated February 24, 2025)
Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).
0
Attacker Value
Unknown
CVE-2022-3366
Disclosure Date: October 31, 2022 (last updated February 24, 2025)
The PublishPress Capabilities WordPress plugin before 2.5.2, PublishPress Capabilities Pro WordPress plugin before 2.5.2 unserializes the content of imported files, which could lead to PHP object injection attacks by administrators, on multisite WordPress configurations. Successful exploitation in this case requires other plugins with a suitable gadget chain to be present on the site.
0
Attacker Value
Unknown
CVE-2022-39298
Disclosure Date: October 12, 2022 (last updated February 24, 2025)
MelisFront is the engine that displays website hosted on Melis Platform. It deals with showing pages, plugins, URL rewritting, search optimization and SEO, etc. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
0
Attacker Value
Unknown
CVE-2022-39297
Disclosure Date: October 12, 2022 (last updated February 24, 2025)
MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
0
Attacker Value
Unknown
CVE-2022-39296
Disclosure Date: October 11, 2022 (last updated February 24, 2025)
MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only.
0
Attacker Value
Unknown
CVE-2022-3208
Disclosure Date: October 10, 2022 (last updated February 24, 2025)
The Simple File List WordPress plugin before 4.4.12 does not implement nonce checks, which could allow attackers to make a logged in admin create new page and change it's content via a CSRF attack.
0
Attacker Value
Unknown
CVE-2022-3207
Disclosure Date: October 10, 2022 (last updated February 24, 2025)
The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
0
Attacker Value
Unknown
CVE-2022-3062
Disclosure Date: September 26, 2022 (last updated February 24, 2025)
The Simple File List WordPress plugin before 4.4.12 does not escape parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2022-1758
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Genki Pre-Publish Reminder WordPress plugin through 1.4.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored XSS as well as RCE when custom code is added via the plugin settings.
0