Filtered by vendor Comsenz
Subscriptions
Total
9 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2008-6958 | 1 Comsenz | 1 Crossday Discuz\! Board | 2024-08-07 | N/A |
wap/index.php in Crossday Discuz! Board 6.x and 7.x allows remote authenticated users to execute arbitrary PHP code via the creditsformula parameter. | ||||
CVE-2008-3554 | 1 Comsenz | 1 Discuz | 2024-08-07 | N/A |
SQL injection vulnerability in index.php in Discuz! 6.0.1 allows remote attackers to execute arbitrary SQL commands via the searchid parameter in a search action. | ||||
CVE-2009-3185 | 1 Comsenz | 2 Crazy Star Plugin, Discuz\! | 2024-08-07 | N/A |
SQL injection vulnerability in plugin.php in the Crazy Star plugin 2.0 for Discuz! allows remote authenticated users to execute arbitrary SQL commands via the fmid parameter in a view action. | ||||
CVE-2018-20424 | 1 Comsenz | 1 Discuzx | 2024-08-05 | N/A |
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to delete the common_member_wechatmp data structure via an ac=unbindmp request to plugin.php. | ||||
CVE-2018-20423 | 1 Comsenz | 1 Discuzx | 2024-08-05 | N/A |
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass a "disabled registration" setting by adding a non-existing wxopenid value to the plugin.php ac=wxregister query string. | ||||
CVE-2018-20422 | 1 Comsenz | 1 Discuzx | 2024-08-05 | N/A |
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass authentication by leveraging a non-empty #wechat#common_member_wechatmp to gain login access to an account via a plugin.php ac=wxregister request (the attacker does not have control over which account will be accessed). | ||||
CVE-2018-18084 | 1 Comsenz | 1 Duomicms | 2024-08-05 | 9.8 Critical |
An issue was discovered in DuomiCMS 3.0. SQL injection exists in the ajax.php file, as demonstrated by the uid parameter. | ||||
CVE-2018-18083 | 1 Comsenz | 1 Duomicms | 2024-08-05 | N/A |
An issue was discovered in DuomiCMS 3.0. Remote PHP code execution is possible via the search.php searchword parameter because "eval" is used during "if" processing. | ||||
CVE-2018-14729 | 1 Comsenz | 1 Discuz\! | 2024-08-05 | N/A |
The database backup feature in upload/source/admincp/admincp_db.php in Discuz! 2.5 and 3.4 allows remote attackers to execute arbitrary PHP code. |
Page 1 of 1.