CVE-2023-54341
- EPSS 0.09%
- Veröffentlicht 13.01.2026 22:52:10
- Zuletzt bearbeitet 03.02.2026 19:20:03
Webgrind 1.1 and before contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts via the file parameter in index.php. The application does not sufficiently encode user-controlled inputs...
CVE-2023-54339
- EPSS 0.7%
- Veröffentlicht 13.01.2026 22:52:09
- Zuletzt bearbeitet 03.02.2026 19:21:26
Webgrind 1.1 contains a remote command execution vulnerability that allows unauthenticated attackers to inject OS commands via the dataFile parameter in index.php. Attackers can execute arbitrary system commands by manipulating the dataFile parameter...
CVE-2018-12909
- EPSS 87.2%
- Veröffentlicht 27.06.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 03:46:05
Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended ...
- EPSS 11.76%
- Veröffentlicht 19.03.2012 18:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Absolute path traversal vulnerability in Webgrind 1.0 and 1.0.2 allows remote attackers to read arbitrary files via a full pathname in the file parameter to index.php.