Show filters
569 Total Results
Displaying 161-170 of 569
Sort by:
Attacker Value
Unknown

CVE-2022-28102

Disclosure Date: April 28, 2022 (last updated February 23, 2025)
A cross-site scripting (XSS) vulnerability in PHP MySQL Admin Panel Generator v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected at /edit-db.php.
Attacker Value
Unknown

CVE-2022-1390

Disclosure Date: April 25, 2022 (last updated February 23, 2025)
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
Attacker Value
Unknown

CVE-2021-25111

Disclosure Date: April 25, 2022 (last updated February 23, 2025)
The English WordPress Admin WordPress plugin before 1.5.2 does not validate the admin_custom_language_return_url before redirecting users o it, leading to an open redirect issue
Attacker Value
Unknown

CVE-2022-27342

Disclosure Date: April 22, 2022 (last updated February 23, 2025)
Link-Admin v0.0.1 was discovered to contain a SQL injection vulnerability via DictRest.ResponseResult().
Attacker Value
Unknown

CVE-2022-24843

Disclosure Date: April 13, 2022 (last updated February 23, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2022-24844

Disclosure Date: April 13, 2022 (last updated February 23, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.
Attacker Value
Unknown

CVE-2021-43008

Disclosure Date: April 05, 2022 (last updated February 23, 2025)
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
Attacker Value
Unknown

CVE-2022-23903

Disclosure Date: March 29, 2022 (last updated February 23, 2025)
A Cross Site Scripting (XSS) vulnerability exists in pearadmin pear-admin-think <=5.0.6, which allows a login account to access arbitrary functions and cause stored XSS through a fake User-Agent.
Attacker Value
Unknown

CVE-2022-0833

Disclosure Date: March 28, 2022 (last updated February 23, 2025)
The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
Attacker Value
Unknown

CVE-2021-46709

Disclosure Date: March 13, 2022 (last updated February 23, 2025)
phpLiteAdmin through 1.9.8.2 allows XSS via the index.php newRows parameter (aka num or number).