Show filters
3,806 Total Results
Displaying 1-10 of 3,806
Sort by:
Attacker Value
Moderate
CVE-2020-35687
Disclosure Date: January 13, 2021 (last updated November 28, 2024)
PHPFusion version 9.03.90 is vulnerable to CSRF attack which leads to deletion of all shoutbox messages by the attacker on behalf of the logged in victim.
3
Attacker Value
Moderate
CVE-2020-28948
Disclosure Date: November 19, 2020 (last updated November 08, 2023)
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
3
Attacker Value
Very High
CVE-2019-11043
Disclosure Date: October 28, 2019 (last updated July 17, 2024)
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.
1
Attacker Value
Unknown
CVE-2019-9082
Disclosure Date: February 24, 2019 (last updated November 27, 2024)
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
3
Attacker Value
Very High
CVE-2005-3299
Disclosure Date: October 23, 2005 (last updated October 04, 2023)
PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
3
Attacker Value
High
CVE-2024-4577
Disclosure Date: June 09, 2024 (last updated June 21, 2024)
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
2
Attacker Value
Very High
CVE-2021-37806
Disclosure Date: October 27, 2021 (last updated November 15, 2023)
An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.
2
Attacker Value
Very High
CVE-2021-33470
Disclosure Date: May 26, 2021 (last updated November 15, 2023)
COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel.
2
Attacker Value
Very High
CVE-2021-26822
Disclosure Date: February 15, 2021 (last updated November 15, 2023)
Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks.
2
Attacker Value
Unknown
CVE-2022-24665
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via a WordPress gutenberg block by any user able to edit posts.
1