Show filters
92 Total Results
Displaying 51-60 of 92
Sort by:
Attacker Value
Unknown
CVE-2019-15935
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has XSS.
0
Attacker Value
Unknown
CVE-2019-15931
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp allows Directory Traversal, a different vulnerability than CVE-2019-16246.
0
Attacker Value
Unknown
CVE-2019-15932
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2019-15933
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has SQL Injection.
0
Attacker Value
Unknown
CVE-2019-16246
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
0
Attacker Value
Unknown
CVE-2019-17428
Disclosure Date: March 28, 2019 (last updated November 27, 2024)
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
0
Attacker Value
Unknown
CVE-2019-15936
Disclosure Date: March 06, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp allows Insecure File Upload.
0
Attacker Value
Unknown
CVE-2017-16100
Disclosure Date: June 07, 2018 (last updated November 26, 2024)
dns-sync is a sync/blocking dns resolver. If untrusted user input is allowed into the resolve() method then command injection is possible.
0
Attacker Value
Unknown
CVE-2017-16024
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
0
Attacker Value
Unknown
CVE-2016-10614
Disclosure Date: June 01, 2018 (last updated November 26, 2024)
httpsync is a port of libcurl to node.js. httpsync downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
0