Page 107 of 5095 results (0.024 seconds)

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

SQL injection vulnerability in Webbax supernewsletter v.1.4.21 and before allows a remote attacker to escalate privileges via the Super Newsletter module in the product_search.php components. • https://security.friendsofpresta.org/modules/2024/04/29/supernewsletter.html https://www.webbax.ch/2017/08/30/9-modules-prestashop-gratuits-offert-par-webbax • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

SQL injection vulnerability in shipup before v.3.3.0 allows a remote attacker to escalate privileges via the getShopID function. • https://security.friendsofpresta.org/modules/2024/04/29/shipup.html https://www.shipup.co/fr • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Local privilege escalation due to insecure folder permissions. • https://security-advisory.acronis.com/advisories/SEC-7171 • CWE-276: Incorrect Default Permissions •

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 0

Local privilege escalation due to unquoted search path vulnerability. ... Local privilege escalation due to unquoted search path vulnerability. • https://security-advisory.acronis.com/advisories/SEC-7110 • CWE-428: Unquoted Search Path or Element •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

SQL injection vulnerability in onethink v.1.1 allows a remote attacker to escalate privileges via a crafted script to the ModelModel.class.php component. • https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152 https://github.com/liu21st/onethink https://github.com/liu21st/onethink/issues/39 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •