Show filters
248 Total Results
Displaying 71-80 of 248
Sort by:
Attacker Value
Unknown

CVE-2022-24387

Disclosure Date: March 14, 2022 (last updated February 23, 2025)
With administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010
Attacker Value
Unknown

CVE-2022-24385

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
A Direct Object Access vulnerability in SmarterTools SmarterTrack leads to information disclosure This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
Attacker Value
Unknown

CVE-2022-24386

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
Stored XSS in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
Attacker Value
Unknown

CVE-2022-24384

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
Attacker Value
Unknown

CVE-2022-24442

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
JetBrains YouTrack before 2021.4.40426 was vulnerable to SSTI (Server-Side Template Injection) via FreeMarker templates.
Attacker Value
Unknown

CVE-2022-24347

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
JetBrains YouTrack before 2021.4.36872 was vulnerable to stored XSS via a project icon.
Attacker Value
Unknown

CVE-2022-24344

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
JetBrains YouTrack before 2021.4.31698 was vulnerable to stored XSS on the Notification templates page.
Attacker Value
Unknown

CVE-2022-24343

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
In JetBrains YouTrack before 2021.4.31698, a custom logo could be set by a user who has read-only permissions.
Attacker Value
Unknown

CVE-2022-24047

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to bypass authentication on affected installations of BMC Track-It! 20.21.01.102. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-14618.
Attacker Value
Unknown

CVE-2022-22766

Disclosure Date: February 12, 2022 (last updated February 23, 2025)
Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.