99 results (0.002 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 1

Business Logic Errors in GitHub repository microweber/microweber prior to 2.0. Errores de lógica empresarial en el repositorio de GitHub microweber/microweber anterior a 2.0. • https://github.com/microweber/microweber/commit/890e9838aabbc799ebefcf6b20ba25e0fd6dbfee https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376 • CWE-840: Business Logic Errors •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0. Falta un mecanismo de manejo de errores estandarizado en el repositorio de GitHub microweber/microweber anterior a 2.0. • https://github.com/microweber/microweber/commit/f7eb9e1c6e801346f07f3b0164a01ac5f2ca5cfd https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e • CWE-544: Missing Standardized Error Handling Mechanism CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

An issue in microweber v.2.0.1 and fixed in v.2.0.4 allows a remote attacker to obtain sensitive information via the HTTP GET method. Un problema en Microweber v.2.0.1 y solucionado en v.2.0.4 permite a un atacante remoto obtener información confidencial a través del método HTTP GET. • https://gist.github.com/grozdniyandy/1847ad48126d6bba39bdeb49114bc300 https://github.com/microweber/microweber/issues/1042 •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Business Logic Errors in GitHub repository microweber/microweber prior to 2.0. Errores de lógica empresarial en el repositorio de GitHub microweber/microweber anterior a 2.0. • https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6 • CWE-840: Business Logic Errors •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component. Vulnerabilidad de carga de archivos en Microweber v.2.0.4 permite a un atacante remoto ejecutar código arbitrario a través de un script manipulado para la función de carga de archivos en el componente de formularios creado. • https://github.com/Cyber-Wo0dy/CVE-2023-49052 https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload • CWE-434: Unrestricted Upload of File with Dangerous Type •