Show filters
231 Total Results
Displaying 31-40 of 231
Sort by:
Attacker Value
Unknown

CVE-2021-4279

Disclosure Date: December 25, 2022 (last updated October 08, 2023)
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-44940

Disclosure Date: December 19, 2022 (last updated October 08, 2023)
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.
Attacker Value
Unknown

CVE-2022-31941

Disclosure Date: June 17, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via \rdms\admin?page=user\manage_user&id=.
Attacker Value
Unknown

CVE-2022-33915

Disclosure Date: June 17, 2022 (last updated February 23, 2025)
Versions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.
Attacker Value
Unknown

CVE-2022-31965

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/admin/respondent_types/manage_respondent_type.php?id=.
Attacker Value
Unknown

CVE-2022-31964

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via rdms/admin/respondent_types/view_respondent_type.php?id=.
Attacker Value
Unknown

CVE-2022-31962

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/admin/incidents/view_incident.php?id=.
Attacker Value
Unknown

CVE-2022-31961

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/admin/incidents/manage_incident.php?id=.
Attacker Value
Unknown

CVE-2022-31959

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/admin/teams/manage_team.php?id=.
Attacker Value
Unknown

CVE-2022-31957

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via rdms/admin/teams/view_team.php?id=.