Max CVSS 7.6 Min CVSS 4.4 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2017-14523 5.0
WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from the administrat
17-05-2024 - 01:14 26-01-2018 - 20:29
CVE-2018-0933 7.6
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". T
24-08-2020 - 17:37 14-03-2018 - 17:29
CVE-2018-0934 7.6
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". T
24-08-2020 - 17:37 14-03-2018 - 17:29
CVE-2018-6180 5.0
A flaw in the profile section of Online Voting System 1.0 allows an unauthenticated user to set an arbitrary password for other accounts.
19-02-2020 - 19:02 08-02-2018 - 23:29
CVE-2018-2636 6.8
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with
03-10-2019 - 00:03 18-01-2018 - 02:29
CVE-2018-0743 4.4
Windows Subsystem for Linux in Windows 10 version 1703, Windows 10 version 1709, and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Subsystem for Linux Elevation
03-10-2019 - 00:03 04-01-2018 - 14:29
CVE-2017-14521 6.5
In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload.
26-04-2019 - 19:58 26-01-2018 - 20:29
CVE-2018-6389 5.0
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many
01-03-2019 - 19:07 06-02-2018 - 17:29
CVE-2007-4907 7.5
Multiple PHP remote file inclusion vulnerabilities in X-Cart allow remote attackers to execute arbitrary PHP code via a URL in the xcart_dir parameter to (1) config.php, (2) prepare.php, (3) smarty.php, (4) customer/product.php, (5) provider/auth.php
29-09-2017 - 01:29 17-09-2007 - 16:17
Back to Top Mark selected
Back to Top