Show filters
92 Total Results
Displaying 51-60 of 92
Sort by:
Attacker Value
Unknown

CVE-2019-15935

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has XSS.
Attacker Value
Unknown

CVE-2019-15931

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp allows Directory Traversal, a different vulnerability than CVE-2019-16246.
Attacker Value
Unknown

CVE-2019-15932

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has Incorrect Access Control.
Attacker Value
Unknown

CVE-2019-15933

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp has SQL Injection.
Attacker Value
Unknown

CVE-2019-16246

Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
Attacker Value
Unknown

CVE-2019-17428

Disclosure Date: March 28, 2019 (last updated November 27, 2024)
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
Attacker Value
Unknown

CVE-2019-15936

Disclosure Date: March 06, 2019 (last updated November 27, 2024)
Intesync Solismed 3.3sp allows Insecure File Upload.
Attacker Value
Unknown

CVE-2017-16100

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
dns-sync is a sync/blocking dns resolver. If untrusted user input is allowed into the resolve() method then command injection is possible.
0
Attacker Value
Unknown

CVE-2017-16024

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
The sync-exec module is used to simulate child_process.execSync in node versions <0.11.9. Sync-exec uses tmp directories as a buffer before returning values. Other users on the server have read access to the tmp directory, possibly allowing an attacker on the server to obtain confidential information from the buffer/tmp file, while it exists.
0
Attacker Value
Unknown

CVE-2016-10614

Disclosure Date: June 01, 2018 (last updated November 26, 2024)
httpsync is a port of libcurl to node.js. httpsync downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
0