Show filters
169 Total Results
Displaying 61-70 of 169
Sort by:
Attacker Value
Unknown

CVE-2022-38542

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface. The project has released an update, please upgrade to v1.9.0 and above.
Attacker Value
Unknown

CVE-2022-38540

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the create_kill_session interface.
Attacker Value
Unknown

CVE-2022-38539

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.7.5 to v1.8.5 was discovered to contain a SQL injection vulnerability via the where parameter at /archive/apply.
Attacker Value
Unknown

CVE-2022-38538

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module.
Attacker Value
Unknown

CVE-2022-38537

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface.
Attacker Value
Unknown

CVE-2022-38541

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.
Attacker Value
Unknown

CVE-2022-37318

Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Archer Platform 6.9 SP2 P2 before 6.11 P3 (6.11.0.3) contain a reflected XSS vulnerability. A remote unauthenticated malicious Archer user could potentially exploit this vulnerability by tricking a victim application user into supplying malicious JavaScript code to the vulnerable web application. This code is then reflected to the victim and gets executed by the web browser in the context of the vulnerable web application. 6.10 P4 (6.10.0.4) and 6.11 P2 HF4 (6.11.0.2.4) are also fixed releases.
Attacker Value
Unknown

CVE-2022-37317

Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Archer Platform 6.x before 6.11 P3 contain an HTML injection vulnerability. An authenticated remote attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious code in the context of the web application. 6.10 P4 (6.10.0.4) and 6.11 P2 HF4 (6.11.0.2.4) are also fixed releases.
Attacker Value
Unknown

CVE-2022-37316

Disclosure Date: August 25, 2022 (last updated February 24, 2025)
Archer Platform 6.8 before 6.11 P3 (6.11.0.3) contains an improper API access control vulnerability in a multi-instance system that could potentially present unauthorized metadata to an authenticated user of the affected system. 6.10 P3 HF1 (6.10.0.3.1) is also a fixed release.
Attacker Value
Unknown

CVE-2021-42232

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router.