CVE-2020-18654
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php". Devamını Oku
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php". Devamını Oku
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php". Devamını Oku
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmsforgot-password.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmsforgot-password.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
PHPGurukul Hospital Management System in PHP v4.0 has a Persistent Cross-Site Scripting vulnerability in hmsadminappointment-history.php. Remote registered users can exploit the vulnerability to obtain user…
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmsuser-login.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmsuser-login.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmscheck_availability.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in hmscheck_availability.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive…
Information Disclosure in NoneCMS v1.3 allows remote attackers to obtain sensitive information via the component "/nonecms/vendor". Devamını Oku