Show filters
100 Total Results
Displaying 31-40 of 100
Sort by:
Attacker Value
Unknown
CVE-2021-36461
Disclosure Date: July 15, 2022 (last updated February 24, 2025)
An Arbitrary File Upload vulnerability exists in Microweber 1.1.3 that allows attackers to getshell via the Settings Upload Picture section by uploading pictures with malicious code, user.ini.
0
Attacker Value
Unknown
CVE-2022-2368
Disclosure Date: July 11, 2022 (last updated February 24, 2025)
Authentication Bypass by Spoofing in GitHub repository microweber/microweber prior to 1.2.20.
0
Attacker Value
Unknown
CVE-2022-2353
Disclosure Date: July 09, 2022 (last updated February 24, 2025)
Prior to microweber/microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery, fetch contents from same-site and redirect a user.
0
Attacker Value
Unknown
CVE-2022-2300
Disclosure Date: July 04, 2022 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
0
Attacker Value
Unknown
CVE-2022-2280
Disclosure Date: July 01, 2022 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
0
Attacker Value
Unknown
CVE-2022-2252
Disclosure Date: June 29, 2022 (last updated February 24, 2025)
Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.
0
Attacker Value
Unknown
CVE-2022-2174
Disclosure Date: June 22, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.
0
Attacker Value
Unknown
CVE-2022-2130
Disclosure Date: June 20, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.17.
0
Attacker Value
Unknown
CVE-2022-1631
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker’s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee’s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee’s account.
0
Attacker Value
Unknown
CVE-2022-1584
Disclosure Date: May 04, 2022 (last updated February 23, 2025)
Reflected XSS in GitHub repository microweber/microweber prior to 1.2.16. Executing JavaScript as the victim
0