Show filters
1,232 Total Results
Displaying 171-180 of 1,232
Sort by:
Attacker Value
Unknown

CVE-2023-23617

Disclosure Date: January 28, 2023 (last updated February 24, 2025)
OpenMage LTS is an e-commerce platform. Versions prior to 19.4.22 and 20.0.19 contain an infinite loop in malicious code filter in certain conditions. Versions 19.4.22 and 20.0.19 have a fix for this issue. There are no known workarounds.
Attacker Value
Unknown

CVE-2021-41231

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, an administrator with the permissions to upload files via DataFlow and to create products was able to execute arbitrary code via the convert profile. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
Attacker Value
Unknown

CVE-2021-41144

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, a layout block was able to bypass the block blacklist to execute remote code. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
Attacker Value
Unknown

CVE-2021-41143

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Magento admin users with access to the customer media could execute code on the server. Versions 19.4.22 and 20.0.19 contain a patch for this issue.
Attacker Value
Unknown

CVE-2021-39217

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.
Attacker Value
Unknown

CVE-2021-21395

Disclosure Date: January 27, 2023 (last updated February 24, 2025)
Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.
Attacker Value
Unknown

CVE-2022-4548

Disclosure Date: January 23, 2023 (last updated February 24, 2025)
The Optimize images ALT Text & names for SEO using AI WordPress plugin before 2.0.8 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged-in admin change them via a CSRF attack.
Attacker Value
Unknown

CVE-2022-4101

Disclosure Date: January 16, 2023 (last updated October 08, 2023)
The Images Optimize and Upload CF7 WordPress plugin through 2.1.4 does not validate the file to be deleted via an AJAX action available to unauthenticated users, which could allow them to delete arbitrary files on the server via path traversal attack.
Attacker Value
Unknown

CVE-2022-4370

Disclosure Date: January 02, 2023 (last updated October 08, 2023)
The multimedial images WordPress plugin through 1.0b does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
Attacker Value
Unknown

CVE-2017-20153

Disclosure Date: December 30, 2022 (last updated February 24, 2025)
A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability.