Show filters
4,018 Total Results
Displaying 141-150 of 4,018
Sort by:
Attacker Value
Unknown
CVE-2024-25222
Disclosure Date: February 14, 2024 (last updated February 26, 2025)
Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the projectID parameter at /TaskManager/EditProject.php.
0
Attacker Value
Unknown
CVE-2024-25221
Disclosure Date: February 14, 2024 (last updated February 26, 2025)
A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note Section parameter at /TaskManager/Tasks.php.
0
Attacker Value
Unknown
CVE-2024-25220
Disclosure Date: February 14, 2024 (last updated February 26, 2025)
Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the taskID parameter at /TaskManager/EditTask.php.
0
Attacker Value
Unknown
CVE-2024-25219
Disclosure Date: February 14, 2024 (last updated February 26, 2025)
A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Task Name parameter /TaskManager/Task.php.
0
Attacker Value
Unknown
CVE-2024-25218
Disclosure Date: February 14, 2024 (last updated February 26, 2025)
A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Project Name parameter /TaskManager/Projects.php.
0
Attacker Value
Unknown
CVE-2024-1353
Disclosure Date: February 09, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as critical, has been found in PHPEMS up to 1.0. Affected by this issue is the function index of the file app/weixin/controller/index.api.php. The manipulation of the argument picurl leads to deserialization. The exploit has been disclosed to the public and may be used. VDB-253226 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2024-25191
Disclosure Date: February 08, 2024 (last updated February 26, 2025)
php-jwt 1.0.0 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.
0
Attacker Value
Unknown
CVE-2024-24398
Disclosure Date: February 06, 2024 (last updated February 26, 2025)
Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
0
Attacker Value
Unknown
CVE-2024-24574
Disclosure Date: February 05, 2024 (last updated February 26, 2025)
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. Unsafe echo of filename in phpMyFAQ\phpmyfaq\admin\attachments.php leads to allowed execution of JavaScript code in client side (XSS). This vulnerability has been patched in version 3.2.5.
0
Attacker Value
Unknown
CVE-2024-22208
Disclosure Date: February 05, 2024 (last updated February 26, 2025)
phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.
0