Show filters
100 Total Results
Displaying 81-90 of 100
Sort by:
Attacker Value
Unknown
CVE-2022-0504
Disclosure Date: February 08, 2022 (last updated February 23, 2025)
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0379
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0378
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0282
Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Cross-site Scripting in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0281
Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0278
Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2022-0277
Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Incorrect Permission Assignment for Critical Resource in Packagist microweber/microweber prior to 1.2.11.
0
Attacker Value
Unknown
CVE-2021-33988
Disclosure Date: October 19, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
0
Attacker Value
Unknown
CVE-2020-28337
Disclosure Date: February 15, 2021 (last updated February 22, 2025)
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
0
Attacker Value
Unknown
CVE-2020-23136
Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Microweber v1.1.18 is affected by no session expiry after log-out.
0