SQL injection vulnerability in midroll.php in Nuevolab Nuevoplayer for ClipShare 8.0 and earlier allows remote attackers to execute arbitrary SQL commands via the ch parameter.
Max CVSS
7.5
EPSS Score
0.77%
Published
2014-11-04
Updated
2018-10-09
ClipShare 2.6 does not properly restrict access to certain functionality, which allows remote attackers to change the profile of arbitrary users via a modified uid variable to siteadmin/useredit.php. NOTE: this can be used to recover the password of the user by using the modified e-mail address in the email parameter to recoverpass.php.
Max CVSS
7.5
EPSS Score
1.77%
Published
2009-09-09
Updated
2017-09-29
Cross-site scripting (XSS) vulnerability in fullscreen.php in ClipShare Pro 4.0 allows remote attackers to inject arbitrary web script or HTML via the title parameter.
Max CVSS
4.3
EPSS Score
0.20%
Published
2009-02-19
Updated
2017-08-17
SQL injection vulnerability in channel_detail.php in ClipShare Pro 4, and 2006 through 2007, allows remote attackers to execute arbitrary SQL commands via the chid parameter.
Max CVSS
7.5
EPSS Score
0.12%
Published
2008-12-12
Updated
2017-09-29
SQL injection vulnerability in group_posts.php in ClipShare before 3.0.1 allows remote attackers to execute arbitrary SQL commands via the tid parameter.
Max CVSS
7.5
EPSS Score
0.06%
Published
2008-06-20
Updated
2017-09-29
SQL injection vulnerability in uprofile.php in ClipShare allows remote attackers to execute arbitrary SQL commands via the UID parameter.
Max CVSS
7.5
EPSS Score
0.09%
Published
2008-01-04
Updated
2017-09-29
PHP remote file inclusion vulnerability in include/adodb-connection.inc.php in ClipShare 1.5.3 allows remote attackers to execute arbitrary PHP code via a URL in the cmd parameter.
Max CVSS
7.5
EPSS Score
5.01%
Published
2007-03-13
Updated
2018-10-16
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!