Show filters
219 Total Results
Displaying 111-120 of 219
Sort by:
Attacker Value
Unknown
CVE-2019-3576
Disclosure Date: January 02, 2019 (last updated November 27, 2024)
inxedu through 2018-12-24 has a SQL Injection vulnerability that can lead to information disclosure via the deleteFaveorite/ PATH_INFO. The vulnerable code location is com.inxedu.os.edu.controller.user.UserController#deleteFavorite (aka deleteFavorite in com/inxedu/os/edu/controller/user/UserController.java), where courseFavoritesService.deleteCourseFavoritesById is mishandled during use of MyBatis. NOTE: UserController.java has a spelling variation in an annotation: a @RequestMapping("/deleteFaveorite/{ids}") line followed by a "public ModelAndView deleteFavorite" line.
0
Attacker Value
Unknown
CVE-2018-19991
Disclosure Date: December 10, 2018 (last updated November 27, 2024)
VeryNginx 0.3.3 allows remote attackers to bypass the Web Application Firewall feature because there is no error handler (for get_uri_args or get_post_args) to block the API misuse described in CVE-2018-9230.
0
Attacker Value
Unknown
CVE-2018-18439
Disclosure Date: November 20, 2018 (last updated November 27, 2024)
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
0
Attacker Value
Unknown
CVE-2018-18440
Disclosure Date: November 20, 2018 (last updated November 27, 2024)
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled.
0
Attacker Value
Unknown
Das U-Boot's AES-CBC encryption feature improperly handles an error condition a…
Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.
0
Attacker Value
Unknown
Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector t…
Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
0
Attacker Value
Unknown
CVE-2018-1000205
Disclosure Date: June 26, 2018 (last updated November 26, 2024)
U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.
0
Attacker Value
Unknown
CVE-2018-12519
Disclosure Date: June 19, 2018 (last updated November 26, 2024)
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
0
Attacker Value
Unknown
CVE-2015-4043
Disclosure Date: June 19, 2018 (last updated November 26, 2024)
SQL injection vulnerability in ConnX ESP HR Management 4.4.0 allows remote attackers to execute arbitrary SQL commands via the ctl00$cphMainContent$txtUserName parameter to frmLogin.aspx.
0
Attacker Value
Unknown
CVE-2018-9177
Disclosure Date: June 08, 2018 (last updated November 26, 2024)
Twonky Server before 8.5.1 has XSS via a folder name on the Shared Folders screen.
0