unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
Live-Hack-CVE/CVE-2022-4119
The Image Optimizer, Resizer and CDN WordPress plugin before 6.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:21 +0000 UTC Push: 2023-01-03 08:06:24 +0000 UTC |
Live-Hack-CVE/CVE-2022-4114
The Superio WordPress theme does not sanitise and escape some parameters, which could allow users with a role as low as a subscriber to perform Cross-Site Scripting attacks. CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:16 +0000 UTC Push: 2023-01-03 08:06:20 +0000 UTC |
Live-Hack-CVE/CVE-2022-4109
The Wholesale Market for WooCommerce WordPress plugin before 2.0.0 does not validate user input against path traversal attacks, allowing high privilege users such as admin to download arbitrary logs from the server even when they should not be able to (for example in multisite) CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:13 +0000 UTC Push: 2023-01-03 08:06:15 +0000 UTC |
Live-Hack-CVE/CVE-2022-4099
The Joy Of Text Lite WordPress plugin before 2.3.1 does not properly sanitise and escape some parameters before using them in SQL statements accessible to unauthenticated users, leading to unauthenticated SQL injection CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:09 +0000 UTC Push: 2023-01-03 08:06:11 +0000 UTC |
Live-Hack-CVE/CVE-2022-4059
The Cryptocurrency Widgets Pack WordPress plugin through 1.8.1 does not sanitise and escape some parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:05 +0000 UTC Push: 2023-01-03 08:06:07 +0000 UTC |
Live-Hack-CVE/CVE-2022-4057
The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs. CVE project by @Sn0wAlice
Create: 2023-01-03 08:06:01 +0000 UTC Push: 2023-01-03 08:06:04 +0000 UTC |
Live-Hack-CVE/CVE-2022-4049
The WP User WordPress plugin through 7.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users. CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:57 +0000 UTC Push: 2023-01-03 08:05:59 +0000 UTC |
Live-Hack-CVE/CVE-2022-3994
The Authenticator WordPress plugin before 1.3.1 does not prevent subscribers from updating a site's feed access token, which may deny other users access to the functionality in certain configurations. CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:54 +0000 UTC Push: 2023-01-03 08:05:56 +0000 UTC |
Live-Hack-CVE/CVE-2022-3936
The Team Members WordPress plugin before 5.2.1 does not sanitize and escapes some of its settings, which could allow high-privilege users such as editors to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in a multisite setup). CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:50 +0000 UTC Push: 2023-01-03 08:05:52 +0000 UTC |
Live-Hack-CVE/CVE-2022-3911
The iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscribe CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:45 +0000 UTC Push: 2023-01-03 08:05:49 +0000 UTC |
Live-Hack-CVE/CVE-2022-3860
The Visual Email Designer for WooCommerce WordPress plugin before 1.7.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author. CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:42 +0000 UTC Push: 2023-01-03 08:05:44 +0000 UTC |
Live-Hack-CVE/CVE-2022-3241
The Build App Online WordPress plugin before 1.0.19 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:38 +0000 UTC Push: 2023-01-03 08:05:41 +0000 UTC |
Live-Hack-CVE/CVE-2015-10011
A vulnerability classified as problematic has been found in OpenDNS OpenResolve. This affects an unknown part of the file resolverapi/endpoints.py. The manipulation leads to improper output neutralization for logs. The name of the patch is 9eba6ba5abd89d0e36a008921eb307fcef8c5311. It is recommended to apply a patch to CVE project by @Sn0wAlice
Create: 2023-01-03 08:05:34 +0000 UTC Push: 2023-01-03 08:05:36 +0000 UTC |
Live-Hack-CVE/CVE-2016-15007
A vulnerability was found in Centralized-Salesforce-Dev-Framework. It has been declared as problematic. Affected by this vulnerability is the function SObjectService of the file src/classes/SObjectService.cls of the component SOQL Handler. The manipulation of the argument orderDirection leads to injection. The name of CVE project by @Sn0wAlice
Create: 2023-01-03 05:55:23 +0000 UTC Push: 2023-01-03 05:55:25 +0000 UTC |
Live-Hack-CVE/CVE-2014-125036
A vulnerability, which was classified as problematic, has been found in drybjed ansible-ntp. Affected by this issue is some unknown functionality of the file meta/main.yml. The manipulation leads to insufficient control of network message volume. The attack can only be done within the local network. The name of the pat CVE project by @Sn0wAlice
Create: 2023-01-03 05:55:19 +0000 UTC Push: 2023-01-03 05:55:22 +0000 UTC |
Live-Hack-CVE/CVE-2023-22452
kenny2automate is a Discord bot. In the web interface for server settings, form elements were generated with Discord channel IDs as part of input names. Prior to commit a947d7c, no validation was performed to ensure that the channel IDs submitted actually belonged to the server being configured. Thus anyone who has acc CVE project by @Sn0wAlice
Create: 2023-01-03 05:55:15 +0000 UTC Push: 2023-01-03 05:55:17 +0000 UTC |
Live-Hack-CVE/CVE-2021-35576
Vulnerability in the Oracle Database Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Oracle Net to compromise O CVE project by @Sn0wAlice
Create: 2023-01-03 03:45:07 +0000 UTC Push: 2023-01-03 03:45:10 +0000 UTC |
Live-Hack-CVE/CVE-2014-125038
A vulnerability has been found in IS_Projecto2 and classified as critical. This vulnerability affects unknown code of the file Cnn-EJB/ejbModule/ejbs/NewsBean.java. The manipulation of the argument date leads to sql injection. The name of the patch is aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0. It is recommended to apply CVE project by @Sn0wAlice
Create: 2023-01-03 03:45:02 +0000 UTC Push: 2023-01-03 03:45:05 +0000 UTC |
Live-Hack-CVE/CVE-2014-125037
A vulnerability, which was classified as critical, was found in License to Kill. This affects an unknown part of the file models/injury.rb. The manipulation of the argument name leads to sql injection. The name of the patch is cd11cf174f361c98e9b1b4c281aa7b77f46b5078. It is recommended to apply a patch to fix this issu CVE project by @Sn0wAlice
Create: 2023-01-03 03:44:58 +0000 UTC Push: 2023-01-03 03:45:01 +0000 UTC |
Inplex-sys/CVE-2022-46169
Cacti Unauthenticated Command Injection
Create: 2023-01-03 02:03:26 +0000 UTC Push: 2023-01-03 02:03:26 +0000 UTC |
Previous
766
767
768
769
770
771
772
773
Next