| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Riello UPS NetMan 208 Application before 1.12 allows cgi-bin/loginbanner_w.cgi XSS via a crafted banner. |
| eProsima Fast-DDS v3.3 was discovered to contain improper validation for ticket revocation, resulting in insecure communications and connections. |
| An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file. |
| An Insecure Direct Object Reference (IDOR) in Pagekit CMS v1.0.18 allows attackers to escalate privileges. |
| A SQL injection vulnerability was found in the '/cts/admin/?page=zone' file of ITSourcecode COVID Tracking System Using QR-Code v1.0. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation. |
| An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers to execute arbitrary code by uploading a crafted PDF file. NOTE: this is disputed by the Supplier because the responsibility for file validation (as shown in the documentation) belongs to the system administrator who is implementing Umbraco CMS in their environment, not to Umbraco CMS itself. |
| An arbitrary file upload vulnerability in the Attachments module of Frappe Framework v15.89.0 allows attackers to execute arbitrary code via uploading a crafted XML file. |
| A stored cross-site scripting (XSS) vulnerability in the Page Settings module of Piranha CMS v12.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Excerpt field. |
| A stored cross-site scripting (XSS) vulnerability in the Media module of Piranha CMS v12.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name field. |
| ClipBucket 5.5.2 is affected by an improper access control issue where the product is shipped or deployed with hardcoded default administrative credentials. An unauthenticated remote attacker can log in to the administrative panel using these default credentials, resulting in full administrative control of the application. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |
| This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. |