Show filters
100 Total Results
Displaying 81-90 of 100
Sort by:
Attacker Value
Unknown

CVE-2022-0504

Disclosure Date: February 08, 2022 (last updated February 23, 2025)
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0379

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0378

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0282

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Cross-site Scripting in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0281

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0278

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0277

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
Incorrect Permission Assignment for Critical Resource in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2021-33988

Disclosure Date: October 19, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
Attacker Value
Unknown

CVE-2020-28337

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.
Attacker Value
Unknown

CVE-2020-23136

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Microweber v1.1.18 is affected by no session expiry after log-out.