Vulnerabilities (CVE)

Filtered by vendor Pearadmin Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-6266 1 Pearadmin 1 Pear Admin Boot 2024-09-19 6.5 MEDIUM 9.8 CRITICAL
A vulnerability classified as critical has been found in Pear Admin Boot up to 2.0.2. Affected is an unknown function of the file /system/dictData/loadDictItem. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269478 is the identifier assigned to this vulnerability.
CVE-2024-6241 1 Pearadmin 1 Pear Admin Boot 2024-06-24 6.5 MEDIUM 9.8 CRITICAL
A vulnerability was found in Pear Admin Boot up to 2.0.2 and classified as critical. This issue affects the function getDictItems of the file /system/dictData/getDictItems/. The manipulation with the input ,user(),1,1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269375.
CVE-2021-29378 1 Pearadmin 1 Pear Admin Think 2024-02-28 N/A 8.8 HIGH
SQL Injection in pear-admin-think version 2.1.2, allows attackers to execute arbitrary code and escalate privileges via crafted GET request to Crud.php.
CVE-2023-30417 1 Pearadmin 1 Pear Admin Boot 2024-02-28 N/A 5.4 MEDIUM
A cross-site scripting (XSS) vulnerability in Pear-Admin-Boot up to v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title of a private message.
CVE-2022-23903 1 Pearadmin 1 Pear Admin Think 2024-02-28 3.5 LOW 5.4 MEDIUM
A Cross Site Scripting (XSS) vulnerability exists in pearadmin pear-admin-think <=5.0.6, which allows a login account to access arbitrary functions and cause stored XSS through a fake User-Agent.
CVE-2021-29377 1 Pearadmin 1 Pearadmin Think 2024-02-28 7.5 HIGH 9.8 CRITICAL
Pear Admin Think through 2.1.2 has an arbitrary file upload vulnerability that allows attackers to execute arbitrary code remotely. A .php file can be uploaded via admin.php/index/upload because app/common/service/UploadService.php mishandles fileExt.