Show filters
207 Total Results
Displaying 81-90 of 207
Sort by:
Attacker Value
Unknown

CVE-2023-26416

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
Adobe Substance 3D Designer version 12.4.0 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Attacker Value
Unknown

CVE-2023-27033

Disclosure Date: April 07, 2023 (last updated February 24, 2025)
Prestashop cdesigner v3.1.3 to v3.1.8 was discovered to contain a code injection vulnerability via the component CdesignerSaverotateModuleFrontController::initContent().
Attacker Value
Unknown

CVE-2023-25260

Disclosure Date: March 28, 2023 (last updated February 24, 2025)
Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.
Attacker Value
Unknown

CVE-2023-25262

Disclosure Date: March 28, 2023 (last updated February 24, 2025)
Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
Attacker Value
Unknown

CVE-2023-25263

Disclosure Date: March 27, 2023 (last updated February 24, 2025)
In Stimulsoft Designer (Desktop) 2023.1.5, and 2023.1.4, once an attacker decompiles the Stimulsoft.report.dll the attacker is able to decrypt any connectionstring stored in .mrt files since a static secret is used. The secret does not differ between the tested versions and different operating systems.
Attacker Value
Unknown

CVE-2023-25261

Disclosure Date: March 27, 2023 (last updated February 24, 2025)
Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report.
Attacker Value
Unknown

CVE-2023-27638

Disclosure Date: March 22, 2023 (last updated February 24, 2025)
An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with a compromised tshirtecommerce_design_cart_id GET parameter in order to exploit an insecure parameter in the functions hookActionCartSave and updateCustomizationTable, which could lead to a SQL injection. This is exploited in the wild in March 2023.
Attacker Value
Unknown

CVE-2023-27637

Disclosure Date: March 22, 2023 (last updated February 24, 2025)
An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with a compromised product_id GET parameter in order to exploit an insecure parameter in the front controller file designer.php, which could lead to a SQL injection. This is exploited in the wild in March 2023.
Attacker Value
Unknown

CVE-2022-4793

Disclosure Date: January 30, 2023 (last updated February 24, 2025)
The Blog Designer WordPress plugin before 2.4.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Attacker Value
Unknown

CVE-2022-4792

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The News & Blog Designer Pack WordPress plugin before 3.3 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.