Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2021-33949: Command execution vulnerability in /wms/src/system/databak.php · Issue #10 · FeMiner/wms

An issue in FeMiner WMS v1.1 allows attackers to execute arbitrary code via the filename parameter and the exec function.

CVE
#sql#vulnerability#windows#apache#php
CVE-2021-32441: CVEproject/ExponentCMS_v2.6.0_sqli.md at main · pang0lin/CVEproject

SQL Injection vulnerability in Exponent-CMS v.2.6.0 fixed in 2.7.0 allows attackers to gain access to sensitive information via the selectValue function in the expConfig class.

CVE-2023-23007: There is a sql injection vulnerability in ESPCMS P8.21120101 · Issue #I680WG · 轻舞飞沙/易思ESPCMS-P8企业建站管理系统 - Gitee.com

An issue was discovered in ESPCMS P8.21120101 after logging in to the background, there is a SQL injection vulnerability in the function node where members are added.

Best POS Management System 1.0 Shell Upload

Best POS Management System version 1.0 suffers from a remote shell upload vulnerability.

Best POS Management System 1.0 SQL Injection

Best POS Management System version 1.0 suffers from multiple remote SQL injection vulnerabilities.

Best POS Management System 1.0 Cross Site Scripting

Best POS Management System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

Demanzo Matrimony 1.5 Cross Site Request Forgery

Demanzo Matrimony version 1.5 suffers from a cross site request forgery vulnerability.

Argon Dashboard 1.1.2 SQL Injection

Argon Dashboard version 1.1.2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

CVE-2023-24329: Python URL Parse Problem – PointerNull

An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

CVE-2020-29168: Online Doctor Appointment Booking System PHP and Mysql | Projectworlds

SQL Injection vulnerability in Projectworlds Online Doctor Appointment Booking System, allows attackers to gain sensitive information via the q parameter to the getuser.php endpoint.