Search Results (322763 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2018-20630 1 Advance Crowdfunding Script Project 1 Advance Crowdfunding Script 2024-11-21 N/A
PHP Scripts Mall Advance Crowdfunding Script 2.0.3 has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
CVE-2018-20629 1 Charity Donation Script Project 1 Charity Donation Script 2024-11-21 N/A
PHP Scripts Mall Charity Donation Script readymadeb2bscript has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
CVE-2018-20628 1 Charity Foundation Script Project 1 Charity Foundation Script 2024-11-21 N/A
PHP Scripts Mall Charity Foundation Script 1 through 3 allows directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
CVE-2018-20627 1 Consumer Reviews Script Project 1 Consumer Reviews Script 2024-11-21 N/A
PHP Scripts Mall Consumer Reviews Script 4.0.3 has HTML injection via the search box.
CVE-2018-20626 1 Consumer Reviews Script Project 1 Consumer Reviews Script 2024-11-21 N/A
PHP Scripts Mall Consumer Reviews Script 4.0.3 has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
CVE-2018-20621 1 Microvirt 1 Memu 2024-11-21 N/A
An issue was discovered in Microvirt MEmu 6.0.6. The MemuService.exe service binary is vulnerable to local privilege escalation through binary planting due to insecure permissions set at install time. This allows code to be run as NT AUTHORITY/SYSTEM.
CVE-2018-20617 1 Ok-file-formats Project 1 Ok-file-formats 2024-11-21 N/A
ok-file-formats through 2018-10-16 has a heap-based buffer overflow in the ok_csv_decode2 function in ok_csv.c.
CVE-2018-20616 1 Ok-file-formats Project 1 Ok-file-formats 2024-11-21 N/A
ok-file-formats through 2018-10-16 has a heap-based buffer overflow in the ok_wav_decode_ms_adpcm_data function in ok_wav.c.
CVE-2018-20615 4 Canonical, Haproxy, Opensuse and 1 more 7 Ubuntu Linux, Haproxy, Leap and 4 more 2024-11-21 N/A
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
CVE-2018-20614 1 Cim Project 1 Cim 2024-11-21 N/A
public\install\install.php in CIM 0.9.3 allows remote attackers to reload the product via the public/install/#/step3 URI.
CVE-2018-20613 1 Temmoku Project 1 Temmoku 2024-11-21 N/A
TEMMOKU T1.09 Beta allows admin/user/add CSRF.
CVE-2018-20612 1 Asthis 1 Universal Website Asthis 2024-11-21 N/A
UWA 2.3.11 allows index.php?g=admin&c=admin&a=add_admin_do CSRF.
CVE-2018-20611 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allow XSS via a crafted cookie to the root/tools/adbug/binfo.php?cookie URI.
CVE-2018-20610 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows directory traversal via the root/run/adm.php efile parameter.
CVE-2018-20609 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows remote attackers to obtain potentially sensitive configuration information via the root/tools/adbug/check.php URI.
CVE-2018-20608 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.
CVE-2018-20607 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows remote attackers to obtain potentially sensitive debugging information via the root/tools/adbug/binfo.php URI.
CVE-2018-20606 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows full path disclosure via a dev.php?tools-ipaddr&api=Pcoln&uip= URI.
CVE-2018-20605 1 Txjia 1 Imcat 2024-11-21 N/A
imcat 4.4 allows remote attackers to execute arbitrary PHP code by using root/run/adm.php to modify the boot/bootskip.php file.
CVE-2018-20604 1 Lfdycms 1 Lei Feng Tv Cms 2024-11-21 N/A
Lei Feng TV CMS (aka LFCMS) 3.8.6 allows Directory Traversal via crafted use of ..* in Template/edit/path URIs, as demonstrated by the admin.php?s=/Template/edit/path/*web*..*..*..*..*1.txt.html URI to read the 1.txt file.