Show filters
569 Total Results
Displaying 161-170 of 569
Sort by:
Attacker Value
Unknown
CVE-2022-28102
Disclosure Date: April 28, 2022 (last updated February 23, 2025)
A cross-site scripting (XSS) vulnerability in PHP MySQL Admin Panel Generator v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected at /edit-db.php.
0
Attacker Value
Unknown
CVE-2022-1390
Disclosure Date: April 25, 2022 (last updated February 23, 2025)
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
0
Attacker Value
Unknown
CVE-2021-25111
Disclosure Date: April 25, 2022 (last updated February 23, 2025)
The English WordPress Admin WordPress plugin before 1.5.2 does not validate the admin_custom_language_return_url before redirecting users o it, leading to an open redirect issue
0
Attacker Value
Unknown
CVE-2022-27342
Disclosure Date: April 22, 2022 (last updated February 23, 2025)
Link-Admin v0.0.1 was discovered to contain a SQL injection vulnerability via DictRest.ResponseResult().
0
Attacker Value
Unknown
CVE-2022-24843
Disclosure Date: April 13, 2022 (last updated February 23, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-24844
Disclosure Date: April 13, 2022 (last updated February 23, 2025)
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.
0
Attacker Value
Unknown
CVE-2021-43008
Disclosure Date: April 05, 2022 (last updated February 23, 2025)
Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
0
Attacker Value
Unknown
CVE-2022-23903
Disclosure Date: March 29, 2022 (last updated February 23, 2025)
A Cross Site Scripting (XSS) vulnerability exists in pearadmin pear-admin-think <=5.0.6, which allows a login account to access arbitrary functions and cause stored XSS through a fake User-Agent.
0
Attacker Value
Unknown
CVE-2022-0833
Disclosure Date: March 28, 2022 (last updated February 23, 2025)
The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data
0
Attacker Value
Unknown
CVE-2021-46709
Disclosure Date: March 13, 2022 (last updated February 23, 2025)
phpLiteAdmin through 1.9.8.2 allows XSS via the index.php newRows parameter (aka num or number).
0