Show filters
4,018 Total Results
Displaying 161-170 of 4,018
Sort by:
Attacker Value
Unknown
CVE-2023-6889
Disclosure Date: December 16, 2023 (last updated February 25, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
0
Attacker Value
Unknown
CVE-2023-50252
Disclosure Date: December 12, 2023 (last updated February 25, 2025)
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue.
0
Attacker Value
Unknown
CVE-2023-50251
Disclosure Date: December 12, 2023 (last updated February 25, 2025)
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when parsing the attributes passed to a `use` tag inside an svg document, an attacker can cause the system to go to an infinite recursion. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. An attacker sending multiple request to a system to render the above payload can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 0.5.1 contains a patch for this issue.
0
Attacker Value
Unknown
CVE-2023-6654
Disclosure Date: December 10, 2023 (last updated February 25, 2025)
A vulnerability classified as critical was found in PHPEMS 6.x/7.x/8.x/9.0. Affected by this vulnerability is an unknown functionality in the library lib/session.cls.php of the component Session Data Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247357 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-6472
Disclosure Date: December 02, 2023 (last updated February 25, 2025)
A vulnerability, which was classified as problematic, has been found in PHPEMS 7.0. This issue affects some unknown processing of the file app\content\cls\api.cls.php of the component Content Section Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246629 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-6027
Disclosure Date: November 30, 2023 (last updated February 25, 2025)
A critical flaw has been identified in elijaa/phpmemcachedadmin affecting version 1.3.0, specifically related to a stored XSS vulnerability. This vulnerability allows malicious actors to insert a carefully crafted JavaScript payload. The issue arises from improper encoding of user-controlled entries in the "/pmcadmin/configure.php" parameter.
0
Attacker Value
Unknown
CVE-2023-6026
Disclosure Date: November 30, 2023 (last updated February 25, 2025)
A Path traversal vulnerability has been reported in elijaa/phpmemcachedadmin affecting version 1.3.0. This vulnerability allows an attacker to delete files stored on the server due to lack of proper verification of user-supplied input.
0
Attacker Value
Unknown
CVE-2023-49316
Disclosure Date: November 27, 2023 (last updated February 25, 2025)
In Math/BinaryField.php in phpseclib 3 before 3.0.34, excessively large degrees can lead to a denial of service.
0
Attacker Value
Unknown
CVE-2023-26542
Disclosure Date: November 22, 2023 (last updated February 25, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Exeebit phpinfo() WP plugin <= 4.0 versions.
0
Attacker Value
Unknown
CVE-2017-20187
Disclosure Date: November 05, 2023 (last updated February 25, 2025)
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
0