Latest CVE Feed
-
7.5
HIGHCVE-2018-1000515
ventrian News-Articles version NewsArticles.00.09.11 contains a XML External Entity (XXE) vulnerability in News-Articles/API/MetaWebLog/Handler.ashx.vb that can result in Attacker can read any file in the server or use smbrelay attack to access to server.... Read more
Affected Products : news-articles- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2018-1000514
LimeSurvey version 3.0.0-beta.3+17110 contains a Cross ite Request Forgery (CSRF) vulnerability in Boxes that can result in CSRF admins to delete boxes. This vulnerability appears to have been fixed in 3.6.x.... Read more
Affected Products : limesurvey- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2018-1000513
LimeSurvey version 3.0.0-beta.3+17110 contains a Cross Site Scripting (XSS) vulnerability in Boxes that can result in JS code execution against LimeSurvey admins. This vulnerability appears to have been fixed in 3.6.x.... Read more
Affected Products : limesurvey- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2018-1000512
Tooltipy Tooltipy (tooltips for WP) version 5 contains a Cross Site Scripting (XSS) vulnerability in Glossary shortcode that can result in could allow anybody to do almost anything an admin can. This attack appear to be exploitable via Admin must follow a... Read more
Affected Products : tooltipy- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2018-1000511
WP ULike version 2.8.1, 3.1 contains a Incorrect Access Control vulnerability in AJAX that can result in allows anybody to delete any row in certain tables. This attack appear to be exploitable via Attacker must make AJAX request. This vulnerability appea... Read more
Affected Products : ulike- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-1000510
WP Image Zoom version 1.23 contains a Incorrect Access Control vulnerability in AJAX settings that can result in allows anybody to cause denial of service. This attack appear to be exploitable via Can be triggered intentionally (or unintentionally via CSR... Read more
Affected Products : image_zoom- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2018-1000509
Redirection version 2.7.1 contains a Serialisation vulnerability possibly allowing ACE vulnerability in Settings page AJAX that can result in could allow admin to execute arbitrary code in some circumstances. This attack appear to be exploitable via Attac... Read more
Affected Products : redirection- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2018-1000508
WP ULike version 2.8.1, 3.1 contains a Cross Site Scripting (XSS) vulnerability in Settings screen that can result in allows unauthorised users to do almost anything an admin can. This attack appear to be exploitable via Admin must visit logs page. This v... Read more
Affected Products : ulike- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-1000507
WP User Groups version 2.0.0 contains a Cross ite Request Forgery (CSRF) vulnerability in Settings page that can result in allows anybody to modify user groups and types. This attack appear to be exploitable via Admin must click on link. This vulnerabilit... Read more
Affected Products : wp_user_groups- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2018-1000506
Metronet Tag Manager version 1.2.7 contains a Cross ite Request Forgery (CSRF) vulnerability in Settings page /wp-admin/options-general.php?page=metronet-tag-manager that can result in allows anybody to do almost anything an admin can. This attack appear ... Read more
Affected Products : metronet_tag_manager- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-1000505
Tooltipy (tooltips for WP) version 5 contains a Cross ite Request Forgery (CSRF) vulnerability in Settings page that can result in could allow anybody to duplicate posts. This attack appear to be exploitable via Admin must follow a link. This vulnerabilit... Read more
Affected Products : tooltipy- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2018-1000504
Redirection version 2.7.3 contains a ACE via file inclusion vulnerability in Pass-through mode that can result in allows admins to execute any PHP file in the filesystem. This attack appear to be exploitable via Attacker must be have access to an admin ac... Read more
Affected Products : redirection- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2018-1000503
MyBB Group MyBB contains a Incorrect Access Control vulnerability in Private forums that can result in Users can view posts from private forums without having the password. This attack appear to be exploitable via Subscribe to a forum through IDOR. This v... Read more
Affected Products : mybb- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2018-1000502
MyBB Group MyBB contains a File Inclusion vulnerability in Admin panel (Tools and Maintenance -> Task Manager -> Add New Task) that can result in Allows Local File Inclusion on modern PHP versions and Remote File Inclusion on ancient PHP versions. This at... Read more
Affected Products : mybb- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2018-1000501
Instant Update CMS contains a Password Reset Vulnerability vulnerability in /iu-application/controllers/administration/auth.php that can result in Account Tackover. This attack appear to be exploitable via network connectivity. This vulnerability appears ... Read more
Affected Products : instant_update_cms- Published: Jun. 26, 2018
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2018-1000426
A cross-site scripting vulnerability exists in Jenkins Git Changelog Plugin 2.6 and earlier in GitChangelogSummaryDecorator/summary.jelly, GitChangelogLeftsideBuildDecorator/badge.jelly, GitLogJiraFilterPostPublisher/config.jelly, GitLogBasicChangelogPost... Read more
Affected Products : git_changelog- Published: Jan. 09, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-1000425
An insufficiently protected credentials vulnerability exists in Jenkins SonarQube Scanner Plugin 2.8 and earlier in SonarInstallation.java that allows attackers with local file system access to obtain the credentials used to connect to SonarQube.... Read more
Affected Products : sonarqube_scanner- Published: Jan. 09, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-1000424
An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for t... Read more
Affected Products : artifactory- Published: Jan. 09, 2019
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2018-1000423
An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials u... Read more
Affected Products : crowd2- Published: Jan. 09, 2019
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2018-1000422
An improper authorization vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java that allows attackers to have Jenkins perform a connection test, connecting to an attacker-specified server with attacker-spe... Read more
Affected Products : crowd2- Published: Jan. 09, 2019
- Modified: Nov. 21, 2024