Show filters
570 Total Results
Displaying 31-40 of 570
Sort by:
Attacker Value
Unknown

CVE-2024-44676

Disclosure Date: September 10, 2024 (last updated September 26, 2024)
eladmin v2.7 and before is vulnerable to Cross Site Scripting (XSS) which allows an attacker to execute arbitrary code via LocalStoreController. java.
Attacker Value
Unknown

CVE-2024-7928

Disclosure Date: August 19, 2024 (last updated September 14, 2024)
A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
Attacker Value
Unknown

CVE-2024-7458

Disclosure Date: August 04, 2024 (last updated August 07, 2024)
A vulnerability was found in elunez eladmin up to 2.7 and classified as critical. This issue affects some unknown processing of the file /api/deploy/upload /api/database/upload of the component Database Management/Deployment Management. The manipulation of the argument file leads to path traversal: 'dir/../../filename'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273551.
Attacker Value
Unknown

CVE-2024-7453

Disclosure Date: August 04, 2024 (last updated August 21, 2024)
A vulnerability was found in FastAdmin 1.5.0.20240328. It has been declared as problematic. This vulnerability affects unknown code of the file /[admins_url].php/general/attachment/edit/ids/4?dialog=1 of the component Attachment Management Section. The manipulation of the argument row[url]/row[imagewidth]/row[imageheight] leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273544.
Attacker Value
Unknown

CVE-2024-6123

Disclosure Date: July 09, 2024 (last updated January 05, 2025)
The Bit Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'iconUpload' function in all versions up to, and including, 2.13.3. This makes it possible for authenticated attackers, with administrator-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
0
Attacker Value
Unknown

CVE-2024-39308

Disclosure Date: July 08, 2024 (last updated August 23, 2024)
RailsAdmin is a Rails engine that provides an interface for managing data. RailsAdmin list view has the XSS vulnerability, caused by improperly-escaped HTML title attribute. Upgrade to 3.1.3 or 2.2.2 (to be released).
Attacker Value
Unknown

CVE-2024-6238

Disclosure Date: June 25, 2024 (last updated June 26, 2024)
pgAdmin <= 8.8 has an installation Directory permission issue. Because of this issue, attackers can gain unauthorised access to the installation directory on the Debian or RHEL 8 platforms.
0
Attacker Value
Unknown

CVE-2023-45195

Disclosure Date: June 24, 2024 (last updated June 25, 2024)
Adminer and AdminerEvo are vulnerable to SSRF via database connection fields. This could allow an unauthenticated remote attacker to enumerate or access systems the attacker would not otherwise have access to. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4.
0
Attacker Value
Unknown

CVE-2023-45196

Disclosure Date: June 24, 2024 (last updated June 25, 2024)
Adminer and AdminerEvo allow an unauthenticated remote attacker to cause a denial of service by connecting to an attacker-controlled service that responds with HTTP redirects. The denial of service is subject to PHP configuration limits. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.4.
0
Attacker Value
Unknown

CVE-2024-6266

Disclosure Date: June 23, 2024 (last updated September 20, 2024)
A vulnerability classified as critical has been found in Pear Admin Boot up to 2.0.2. Affected is an unknown function of the file /system/dictData/loadDictItem. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269478 is the identifier assigned to this vulnerability.