Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown
CVE-2023-47397
Disclosure Date: November 08, 2023 (last updated November 16, 2023)
WeBid <=1.2.2 is vulnerable to code injection via admin/categoriestrans.php.
0
Attacker Value
Unknown
CVE-2022-41477
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A security issue was discovered in WeBid <=1.2.2. A Server-Side Request Forgery (SSRF) vulnerability in the admin/theme.php file allows remote attackers to inject payloads via theme parameters to read files across directories.
0
Attacker Value
Unknown
CVE-2020-23359
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
WeBid 1.2.2 admin/newuser.php has an issue with password rechecking during registration because it uses a loose comparison to check the identicalness of two passwords. Two non-identical passwords can still bypass the check.
0
Attacker Value
Unknown
CVE-2019-11592
Disclosure Date: April 29, 2019 (last updated November 27, 2024)
WeBid 1.2.2 has reflected XSS via the id parameter to admin/deletenews.php, admin/editbannersuser.php, admin/editfaqscategory.php, or admin/excludeuser.php, or the offset parameter to admin/edituser.php.
0
Attacker Value
Unknown
CVE-2018-1000867
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
WeBid version up to current version 1.2.2 contains a SQL Injection vulnerability in All five yourauctions*.php scripts that can result in Database Read via Blind SQL Injection. This attack appear to be exploitable via HTTP Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
0
Attacker Value
Unknown
CVE-2018-1000882
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
0
Attacker Value
Unknown
CVE-2018-1000868
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
0
Attacker Value
Unknown
CVE-2014-5114
Disclosure Date: July 29, 2014 (last updated October 05, 2023)
WeBid 1.1.1 allows remote attackers to conduct an LDAP injection attack via the (1) js or (2) cat parameter.
0
Attacker Value
Unknown
CVE-2014-5101
Disclosure Date: July 25, 2014 (last updated October 05, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php.
0
Attacker Value
Unknown
CVE-2010-4873
Disclosure Date: October 07, 2011 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in confirm.php in WeBid 0.8.5 P1 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
0