The exploit has been disclosed to the public and may be used. The manipulation of the argument id leads to sql injection. Affected by this issue is some unknown functionality of the file admin/prof.php. The identifier VDB-222697 was assigned to this vulnerability.Ī vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. The manipulation of the argument input leads to sql injection. Affected by this vulnerability is an unknown functionality of the file admin/search_it.php. The identifier of this vulnerability is VDB-222696.Ī vulnerability classified as critical was found in SourceCodester Online Graduate Tracer System 1.0. It is possible to launch the attack remotely. The manipulation of the argument user leads to sql injection. Affected is an unknown function of the file admin/adminlog.php. Online_graduate_tracer_system_project - online_graduate_tracer_systemĪ vulnerability classified as critical has been found in SourceCodester Online Graduate Tracer System 1.0. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saysis Starcities allows SQL Injection.This issue affects Starcities: through 1.3.Īuthentication Bypass by Primary Weakness in GitHub repository froxlor/froxlor prior to 2.0.13. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Alpata Licensed Warehousing Automation System allows Command Line Execution through SQL Injection.This issue affects Licensed Warehousing Automation System: through 2023.1.01. This password cannot be changed by the user.Īkuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file.Īlpatateknoloji - licensed_warehousing_automation_system The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection Access control based on object state is mishandled. Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TEXT AVRCP response.Īn issue was discovered in eZ Publish Ibexa Kernel before 7.5.28. Memory corruption in Video due to double free while playing 3gp clip with invalid metadata atoms. The issue is fixed in versions 2.7.8 and 3.0.2-1. Prior to versions 2.7.8 and 3.0.2-1, the reset password token is generated without any randomness parameter. Memory corruption due to improper validation of array index in Multi-mode call processor.Ĭombodo iTop is an open source, web-based IT service management platform. The Kamailio SIP before 5.5.0 server mishandles INVITE requests with duplicated fields and overlength tag, leading to a buffer overflow that crashes the server or possibly have unspecified other impact.Īn issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s). Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. Patch information is provided when available. This information may include identifying information, values, definitions, and related links. Low: vulnerabilities with a CVSS base score of 0.0–3.9Įntries may include additional information provided by organizations and efforts sponsored by CISA. Medium: vulnerabilities with a CVSS base score of 4.0–6.9.High: vulnerabilities with a CVSS base score of 7.0–10.0.The division of high, medium, and low severities correspond to the following scores: Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
0 Comments
Leave a Reply. |