Page(s) : 1 ... 567 568 569 570 571 572 573 574 575 576 [577] 578 579 580 581 582 583 584 585 586 587 ... | Result(s) : 43431 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
9.8 | 2022-06-07 | CVE-2020-36542 | cve | A vulnerability classified as critical has been found in Demokratian. This affects an unknown part of the file install/install3.php. The manipulation leads to privilege escalati... |
9.8 | 2022-06-07 | CVE-2020-36541 | cve | A vulnerability was found in Demokratian. It has been rated as critical. Affected by this issue is some unknown functionality of the file basicos_php/genera_select.php. The mani... |
9.8 | 2022-06-07 | CVE-2020-36540 | cve | A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. I... |
9.8 | 2022-06-07 | CVE-2020-36533 | cve | A vulnerability was found in Klapp App and classified as problematic. This issue affects some unknown processing of the JSON Web Token Handler. The manipulation leads to weak au... |
9.8 | 2022-06-06 | CVE-2022-31768 | cve | IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add... |
9.8 | 2022-06-06 | CVE-2022-30927 | cve | A SQL injection vulnerability exists in Simple Task Scheduling System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL d... |
10 | 2022-06-06 | CVE-2022-31481 | cve | An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. This vulnerability impacts products based on HID Mercury Intellige... |
9.8 | 2022-06-06 | CVE-2022-32511 | cve | jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable. |
9.8 | 2022-06-06 | CVE-2022-31479 | cve | An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vuln... |
9.8 | 2022-06-03 | CVE-2022-26134 | cve | In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Con... |
9.8 | 2022-06-03 | CVE-2021-42884 | cve | TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function setDeviceName of the file global.so which can control thedeviceName to attack. |
9.8 | 2022-06-03 | CVE-2021-42890 | cve | TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function NTPSyncWithHost of the file system.so which can control hostTime to attack. |
9.8 | 2022-06-03 | CVE-2022-32270 | cve | In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs becau... |
9.8 | 2022-06-03 | CVE-2021-42885 | cve | TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function setDeviceMac of the file global.so which can control deviceName to attack. |
9.8 | 2022-06-03 | CVE-2021-42887 | cve | In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm. |
9.8 | 2022-06-03 | CVE-2021-42888 | cve | TOTOLINK EX1200T V4.1.2cu.5215 contains a remote command injection vulnerability in function setLanguageCfg of the file global.so which can control langType to attack. |
9.8 | 2022-06-03 | CVE-2022-32269 | cve | In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary co... |
9.6 | 2022-06-03 | CVE-2022-32271 | cve | In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that con... |
9.8 | 2022-06-02 | CVE-2022-30235 | cve | A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could allow unauthorized access when an attacker uses brute force. Affected Produc... |
9.8 | 2022-06-02 | CVE-2022-30234 | cve | A CWE-798: Use of Hard-coded Credentials vulnerability exists that could allow arbitrary code to be executed when root level access is obtained. Affected Products: Wiser Smart, ... |
Page(s) : 1 ... 567 568 569 570 571 572 573 574 575 576 [577] 578 579 580 581 582 583 584 585 586 587 ... | Result(s) : 43431 |