Show filters
67 Total Results
Displaying 21-30 of 67
Sort by:
Attacker Value
Unknown

CVE-2020-28447

Disclosure Date: July 25, 2022 (last updated October 07, 2023)
This affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function xopen(filepath)
Attacker Value
Unknown

CVE-2022-21666

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.
Attacker Value
Unknown

CVE-2022-21644

Disclosure Date: January 04, 2022 (last updated October 07, 2023)
USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via usersearch.php. In search terms provided by the user were not sanitized and were used directly to construct a sql statement. The only users permitted to search are site admins. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.
Attacker Value
Unknown

CVE-2022-21643

Disclosure Date: January 04, 2022 (last updated October 07, 2023)
USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, email addresses, and passwords provided by the user were not sanitized and were used directly to construct a sql statement. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.
Attacker Value
Unknown

CVE-2021-23419

Disclosure Date: August 08, 2021 (last updated November 28, 2024)
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
Attacker Value
Unknown

CVE-2020-13568

Disclosure Date: April 13, 2021 (last updated February 22, 2025)
SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit”, the POST parameter parent_id leads to a SQL injection.
Attacker Value
Unknown

CVE-2020-13566

Disclosure Date: April 13, 2021 (last updated February 22, 2025)
SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete”, the POST parameter delete_group leads to a SQL injection.
Attacker Value
Unknown

CVE-2020-13565

Disclosure Date: February 10, 2021 (last updated February 22, 2025)
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-13564

Disclosure Date: February 01, 2021 (last updated February 22, 2025)
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter.
Attacker Value
Unknown

CVE-2020-13563

Disclosure Date: February 01, 2021 (last updated February 22, 2025)
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.