Page 2 of 19 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

16 Apr 2023 — Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4. Neutralización inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ("Inyección SQL") en ExpressTech Quiz And Survey Master. Este problema afecta a Quiz And Survey Master: desde n/a hasta 8.1.4. The Quiz and Survey Master plugin for WordPress is vulnerable to SQL Injection via ... • https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-4-unauthenticated-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

15 Sep 2022 — Qsmart Next v4.1.2 was discovered to contain a cross-site scripting (XSS) vulnerability. Se ha detectado que Qsmart Next versión v4.1.2, contiene una vulnerabilidad de tipo cross-site scripting (XSS) • http://qsmart.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 20%CPEs: 1EXPL: 1

17 Jul 2019 — Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a "redirect" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url. Timesheet Next Gen versión 1.5.3 y versiones anteriores se ven impactados por: Cross Site Scripting (XSS). • https://sourceforge.net/p/tsheetx/code/497/tree/branches/legacy/login.php#l40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

05 Jan 2006 — Cross-site scripting vulnerability in index.php in Next Generation Image Gallery 0.0.1 Lite Edition allows remote attackers to inject arbitrary web script or HTML via the page parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en index.php de Next Generation Image Gallery 0.0.1 Lite Edition permite a atacantes remotos inyectar 'script' web o HTML de su elección mediante el parámetro "page". • http://osvdb.org/ref/22/22202-nextgen.txt •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

22 Oct 1991 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

14 May 1991 — The "me" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root. • http://www.cert.org/advisories/CA-1991-06.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Oct 1990 — BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

03 Oct 1990 — Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

03 Oct 1990 — Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges. Vulnerabilidad en el script de instalación restore0.9 en NeXT 1.0a y 1.0 permite a usuarios locales conseguir privilegios de root. • http://ciac.llnl.gov/ciac/bulletins/b-01.shtml •