‼ CVE-2023-0790 ‼
📖 Read
via "National Vulnerability Database".
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0792 ‼
📖 Read
via "National Vulnerability Database".
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0789 ‼
📖 Read
via "National Vulnerability Database".
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2015-10078 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, has been found in atwellpub Resend Welcome Email Plugin 1.0.1. This issue affects the function send_welcome_email_url of the file resend-welcome-email.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is b14c1f66d307783f0ae74f88088a85999107695c. It is recommended to upgrade the affected component. The identifier VDB-220637 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0793 ‼
📖 Read
via "National Vulnerability Database".
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-0791 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-25102 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The name of the patch is 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0788 ‼
📖 Read
via "National Vulnerability Database".
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0680 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36661 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Kong lua-multipart 0.5.8-1. It has been declared as problematic. This vulnerability affects the function is_header of the file src/multipart.lua. The manipulation leads to inefficient regular expression complexity. Upgrading to version 0.5.9-1 is able to address this issue. The name of the patch is d632e5df43a2928fd537784a99a79dec288bf01b. It is recommended to upgrade the affected component. VDB-220642 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-22349 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing screen management information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22367 ‼
📖 Read
via "National Vulnerability Database".
Ichiran App for iOS versions prior to 3.1.0 and Ichiran App for Android versions prior to 3.1.0 improperly verify server certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22347 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing file structure information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22346 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing template information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25937 ‼
📖 Read
via "National Vulnerability Database".
Versions of the package glance before 3.0.9 are vulnerable to Directory Traversal that allows users to read files outside the public root directory. This is related to but distinct from the vulnerability reported in [CVE-2018-3715](https://security.snyk.io/vuln/npm:glance:20180129).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22362 ‼
📖 Read
via "National Vulnerability Database".
SUSHIRO App for Android outputs sensitive information to the log file, which may result in an attacker obtaining a credential information from the log file. Affected products/versions are as follows: SUSHIRO Ver.4.0.31, Thailand SUSHIRO Ver.1.0.0, Hong Kong SUSHIRO Ver.3.0.2, Singapore SUSHIRO Ver.2.0.0, and Taiwan SUSHIRO Ver.2.0.1📖 Read
via "National Vulnerability Database".
‼ CVE-2022-48323 ‼
📖 Read
via "National Vulnerability Database".
Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22353 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing control management information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22350 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing parts management information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22360 ‼
📖 Read
via "National Vulnerability Database".
Use-after free vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier due to lack of error handling process even when an error was detected. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22345 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bound write vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier due to lack of error handling process when out of specification errors are detected. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.📖 Read
via "National Vulnerability Database".