Show filters
3,806 Total Results
Displaying 1-10 of 3,806
Sort by:
Attacker Value
Moderate

CVE-2020-35687

Disclosure Date: January 13, 2021 (last updated November 28, 2024)
PHPFusion version 9.03.90 is vulnerable to CSRF attack which leads to deletion of all shoutbox messages by the attacker on behalf of the logged in victim.
Attacker Value
Moderate

CVE-2020-28948

Disclosure Date: November 19, 2020 (last updated November 08, 2023)
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
Attacker Value
Very High

CVE-2019-11043

Disclosure Date: October 28, 2019 (last updated July 17, 2024)
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
Attacker Value
Unknown

CVE-2019-9082

Disclosure Date: February 24, 2019 (last updated November 27, 2024)
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Attacker Value
Very High

CVE-2005-3299

Disclosure Date: October 23, 2005 (last updated October 04, 2023)
PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
3
Attacker Value
High

CVE-2024-4577

Disclosure Date: June 09, 2024 (last updated June 21, 2024)
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Attacker Value
Very High

CVE-2021-37806

Disclosure Date: October 27, 2021 (last updated November 15, 2023)
An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.
Attacker Value
Very High

CVE-2021-33470

Disclosure Date: May 26, 2021 (last updated November 15, 2023)
COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel.
Attacker Value
Very High

CVE-2021-26822

Disclosure Date: February 15, 2021 (last updated November 15, 2023)
Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks.
Attacker Value
Unknown

CVE-2022-24665

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via a WordPress gutenberg block by any user able to edit posts.