Show filters
61 Total Results
Displaying 21-30 of 61
Sort by:
Attacker Value
Unknown
CVE-2023-29156
Disclosure Date: July 11, 2023 (last updated September 30, 2024)
DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection.
An attacker can exploit this vulnerability by injecting, at the right times, spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information.
This issue affects DroneScout ds230 in default configuration from firmware version 20211210-1627 through 20230329-1042.
0
Attacker Value
Unknown
CVE-2023-28611
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
Incorrect authorization in OMICRON StationGuard 1.10 through 2.20 and StationScout 1.30 through 2.20 allows an attacker to bypass intended access restrictions.
0
Attacker Value
Unknown
CVE-2023-28610
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
The update process in OMICRON StationGuard and OMICRON StationScout before 2.21 can be exploited by providing a modified firmware update image. This allows a remote attacker to gain root access to the system.
0
Attacker Value
Unknown
CVE-2014-125046
Disclosure Date: January 06, 2023 (last updated October 20, 2023)
A vulnerability, which was classified as critical, was found in Seiji42 cub-scout-tracker. This affects an unknown part of the file databaseAccessFunctions.js. The manipulation leads to sql injection. The patch is named b4bc1a328b1f59437db159f9d136d9ed15707e31. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217551.
0
Attacker Value
Unknown
CVE-2022-36358
Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in SEO Scout plugin <= 0.9.83 at WordPress allows attackers to trick users with administrative rights to unintentionally change the plugin settings.
0
Attacker Value
Unknown
CVE-2022-1592
Disclosure Date: May 05, 2022 (last updated February 23, 2025)
Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...
0
Attacker Value
Unknown
CVE-2022-1554
Disclosure Date: May 03, 2022 (last updated February 23, 2025)
Path Traversal due to `send_file` call in GitHub repository clinical-genomics/scout prior to 4.52.
0
Attacker Value
Unknown
CVE-2021-24246
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
The Workscout Core WordPress plugin before 1.3.4, used by the WorkScout Theme did not sanitise the chat messages sent via the workscout_send_message_chat AJAX action, leading to Stored Cross-Site Scripting and Cross-Frame Scripting issues
0
Attacker Value
Unknown
CVE-2021-24212
Disclosure Date: April 05, 2021 (last updated February 22, 2025)
The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp.
0
Attacker Value
Unknown
CVE-2020-29659
Disclosure Date: December 09, 2020 (last updated February 22, 2025)
A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.
0