Show filters
142 Total Results
Displaying 21-30 of 142
Sort by:
Attacker Value
Unknown

CVE-2022-30374

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
Air Cargo Management System 1.0 is vulnerable to SQL Injection via /acms/admin/?page=transactions/manage_transaction&id=.
Attacker Value
Unknown

CVE-2022-30373

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
Air Cargo Management System 1.0 is vulnerable to SQL Injection via /acms/admin/cargo_types/manage_cargo_type.php?id=.
Attacker Value
Unknown

CVE-2022-30372

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
Air Cargo Management System 1.0 is vulnerable to SQL Injection via /acms/classes/Master.php?f=delete_cargo.
Attacker Value
Unknown

CVE-2022-30371

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
Air Cargo Management System 1.0 is vulnerable to SQL Injection via /acms/admin/cargo_types/view_cargo_type.php?id=.
Attacker Value
Unknown

CVE-2022-30370

Disclosure Date: May 13, 2022 (last updated October 07, 2023)
Air Cargo Management System 1.0 is vulnerable to SQL Injection via /acms/classes/Master.php?f=delete_cargo_type.
Attacker Value
Unknown

CVE-2022-26169

Disclosure Date: March 02, 2022 (last updated February 23, 2025)
Air Cargo Management System v1.0 was discovered to contain a SQL injection vulnerability via the ref_code parameter.
Attacker Value
Unknown

CVE-2021-46061

Disclosure Date: January 20, 2022 (last updated February 23, 2025)
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
Attacker Value
Unknown

CVE-2020-23043

Disclosure Date: October 22, 2021 (last updated February 23, 2025)
Tran Tu Air Sender v1.0.2 was discovered to contain an arbitrary file upload vulnerability in the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted file.
Attacker Value
Unknown

CVE-2020-10283

Disclosure Date: August 20, 2020 (last updated February 22, 2025)
The Micro Air Vehicle Link (MAVLink) protocol presents authentication mechanisms on its version 2.0 however according to its documentation, in order to maintain backwards compatibility, GCS and autopilot negotiate the version via the AUTOPILOT_VERSION message. Since this negotiation depends on the answer, an attacker may craft packages in a way that hints the autopilot to adopt version 1.0 of MAVLink for the communication. Given the lack of authentication capabilities in such version of MAVLink (refer to CVE-2020-10282), attackers may use this method to bypass authentication capabilities and interact with the autopilot directly.
Attacker Value
Unknown

CVE-2020-10282

Disclosure Date: July 03, 2020 (last updated February 21, 2025)
The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized access, PITM attacks and more. According to literature, version 2.0 optionally allows for package signing which mitigates this flaw. Another source mentions that MAVLink 2.0 only provides a simple authentication system based on HMAC. This implies that the flying system overall should add the same symmetric key into all devices of network. If not the case, this may cause a security issue, that if one of the devices and its symmetric key are compromised, the whole authentication system is not reliable.