Latest CVE Feed
-
9.8
CRITICALCVE-2017-20141
A vulnerability classified as critical has been found in Itech Movie Portal Script 7.36. This affects an unknown part of the file /movie.php. The manipulation of the argument f leads to sql injection (Union). It is possible to initiate the attack remotely... Read more
Affected Products : movie_portal_script- Published: Jul. 22, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-34113
An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin.... Read more
Affected Products : dataease- Published: Jul. 22, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2020-28438
This affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js... Read more
Affected Products : deferred-exec- Published: Jul. 25, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-24083
Password authentication bypass vulnerability for local accounts can be used to bypass local authentication checks.... Read more
- Published: Jul. 25, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-27612
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.... Read more
Affected Products : audio_station- Published: Jul. 28, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-22646
The “ipk” package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in Ovarro TBox, allowing malicious code execution.... Read more
Affected Products : tbox_ms-cpu32_firmware tbox_ms-cpu32-s2_firmware tbox_tg2_firmware tbox_rm2_firmware twinsoft tbox_lt2-530_firmware tbox_lt2-532_firmware tbox_lt2-540_firmware tbox_lt2-530 tbox_lt2-532 +5 more products- Published: Jul. 28, 2022
- Modified: Apr. 17, 2025
-
9.8
CRITICALCVE-2022-1277
Inavitas Solar Log product has an unauthenticated SQL Injection vulnerability.... Read more
Affected Products : solar_log- Published: Jul. 29, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-36301
BF-OS version 3.x up to and including 3.83 do not enforce strong passwords which may allow a remote attacker to brute-force the device password.... Read more
Affected Products : bf-os- Published: Aug. 01, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-31181
PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.... Read more
Affected Products : prestashop- Published: Aug. 01, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-34953
Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the startDate parameter at getOrderReport.php.... Read more
Affected Products : pharmacy_management_system- Published: Aug. 02, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICAL- Published: Aug. 02, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-35223
EasyUse MailHunter Ultimate’s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote atta... Read more
Affected Products : mailhunter_ultimate- Published: Aug. 02, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-29807
A SQL injection vulnerability exists within Quest KACE Systems Management Appliance (SMA) through 12.0 that can allow for remote code execution via download_agent_installer.php.... Read more
Affected Products : kace_systems_management_appliance- Published: Aug. 02, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2016-2351
SQL injection vulnerability in home/seos/courier/security_key2.api on the Accellion File Transfer Appliance (FTA) before FTA_9_12_40 allows remote attackers to execute arbitrary SQL commands via the client_id parameter.... Read more
Affected Products : file_transfer_appliance- Published: May. 07, 2016
- Modified: Apr. 12, 2025
-
9.8
CRITICALCVE-2022-2676
A vulnerability was found in SourceCodester Electronic Medical Records System and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument user_email leads to sql ... Read more
Affected Products : electronic_medical_records_system- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-23919
A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to t... Read more
- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-24012
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerabil... Read more
- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-24020
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerabil... Read more
- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-26009
A stack-based buffer overflow vulnerability exists in the confsrv ucloud_set_node_location functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicio... Read more
- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-28665
A memory corruption vulnerability exists in the httpd unescape functionality of FreshTomato 2022.1. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.The `freshtomato-arm` ... Read more
Affected Products : freshtomato- Published: Aug. 05, 2022
- Modified: Nov. 21, 2024