Show filters
1,138 Total Results
Displaying 1-10 of 1,138
Sort by:
Attacker Value
Very High

CVE-2021-43141

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.
Attacker Value
Very High

CVE-2021-42169

Disclosure Date: October 22, 2021 (last updated February 23, 2025)
The Simple Payroll System with Dynamic Tax Bracket in PHP using SQLite Free Source Code (by: oretnom23 ) is vulnerable from remote SQL-Injection-Bypass-Authentication for the admin account. The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads.
Attacker Value
Moderate

CVE-2019-9053

Disclosure Date: March 26, 2019 (last updated November 27, 2024)
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
3
Attacker Value
Very High

CVE-2021-41492

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Multiple SQL Injection vulnerabilities exist in Sourcecodester Simple Cashiering System (POS) 1.0 via the (1) Product Code in the pos page in cashiering. (2) id parameter in manage_products and the (3) t paramater in actions.php.
Attacker Value
Very High

CVE-2021-43140

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.
Attacker Value
Very High

CVE-2021-38840

Disclosure Date: September 07, 2021 (last updated February 23, 2025)
SQL Injection can occur in Simple Water Refilling Station Management System 1.0 via the water_refilling/classes/Login.php username parameter.
Attacker Value
Very High

CVE-2024-57728

Disclosure Date: January 15, 2025 (last updated January 17, 2025)
SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
Attacker Value
High

CVE-2024-57727

Disclosure Date: January 15, 2025 (last updated January 17, 2025)
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
Attacker Value
Unknown

CVE-2024-13353

Disclosure Date: February 21, 2025 (last updated February 23, 2025)
The Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.6.4 via several widgets. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Attacker Value
Unknown

CVE-2024-13679

Disclosure Date: February 19, 2025 (last updated February 19, 2025)
The Widget BUY.BOX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buybox-widget' shortcode in all versions up to, and including, 3.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.