15 results (0.013 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

08 Nov 2023 — WeBid <=1.2.2 is vulnerable to code injection via admin/categoriestrans.php. WeBid en versiones &lt;= 1.2.2 es vulnerable a la inyección de código a través de admin/categoriestrans.php. • https://liotree.github.io/2023/webid.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 1

14 Oct 2022 — A security issue was discovered in WeBid <=1.2.2. A Server-Side Request Forgery (SSRF) vulnerability in the admin/theme.php file allows remote attackers to inject payloads via theme parameters to read files across directories. Se ha detectado un problema de seguridad en WeBid versiones anteriores a 1.2.2 incluyéndola. Una vulnerabilidad de tipo Server-Side Request Forgery (SSRF) en el archivo admin/theme.php permite a atacantes remotos inyectar cargas útiles por medio de parámetros del tema para leer archiv... • https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

27 Jan 2021 — WeBid 1.2.2 admin/newuser.php has an issue with password rechecking during registration because it uses a loose comparison to check the identicalness of two passwords. Two non-identical passwords can still bypass the check. WeBid versión 1.2.2, el archivo admin/newuser.php presenta un problema con la comprobación de contraseñas durante el registro porque usa una comparación imprecisa para comprobar la identidad de dos contraseñas.&#xa0;Dos contraseñas no idénticas aún pueden omitir la comprobación • https://github.com/renlok/WeBid/issues/530 • CWE-697: Incorrect Comparison •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

29 Apr 2019 — WeBid 1.2.2 has reflected XSS via the id parameter to admin/deletenews.php, admin/editbannersuser.php, admin/editfaqscategory.php, or admin/excludeuser.php, or the offset parameter to admin/edituser.php. WeBid versión 1.2.2, tiene reflected XSS a través del parámetro id en admin/deletenews.php, admin/editbannersuser.php, admin/editfaqscategory.php, o admin/excludeuser.php, o el parámetro offset en admin/edituser.php. • https://www.netsparker.com/web-applications-advisories/ns-18-053-reflected-cross-site-scripting-in-webid • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

20 Dec 2018 — WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f. WeBid, hasta la actual versión 1.2.2, contiene una vulnerabilidad de salto de directorio en getthumb.php que puede resultar en la lectura de archivos de imagen arbitrarios. Este ataque parece ser expl... • http://bugs.webidsupport.com/view.php?id=646 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

20 Dec 2018 — WeBid version up to current version 1.2.2 contains a SQL Injection vulnerability in All five yourauctions*.php scripts that can result in Database Read via Blind SQL Injection. This attack appear to be exploitable via HTTP Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f. WeBid, hasta la actual versión 1.2.2, contiene una vulnerabilidad de inyección SQL en los 5 scripts yourauctions*.php que puede resultar en la lectura de la base de datos media... • http://bugs.webidsupport.com/view.php?id=647 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

20 Dec 2018 — WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f. WeBid, hasta la actual versión 1.2.2, contiene una vulnerabilidad Cross-Site Scripting (X... • http://bugs.webidsupport.com/view.php?id=648 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

29 Jul 2014 — WeBid 1.1.1 allows remote attackers to conduct an LDAP injection attack via the (1) js or (2) cat parameter. WeBid 1.1.1 permite a atacantes remotos realizar un ataque de inyección LDAP a través del parámetro (1) js o (2) cat. • http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

25 Jul 2014 — Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php. Mú... • https://www.exploit-db.com/exploits/39249 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 1%CPEs: 1EXPL: 5

07 Oct 2011 — Cross-site scripting (XSS) vulnerability in confirm.php in WeBid 0.8.5 P1 allows remote attackers to inject arbitrary web script or HTML via the id parameter. Vulnerabilidad cross-site scripting (XSS) en confirm.php en WeBid v0.8.5 P1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro id. • https://www.exploit-db.com/exploits/34989 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •