Show filters
29,424 Total Results
Displaying 81-90 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2021-41675
Disclosure Date: October 29, 2021 (last updated February 23, 2025)
A Remote Code Execution (RCE) vulnerabilty exists in Sourcecodester E-Negosyo System 1.0 in /admin/produts/controller.php via the doInsert function, which validates images with getImageSizei. .
2
Attacker Value
High
CVE-2021-37975
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2
Attacker Value
Very High
CVE-2021-41511
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
2
Attacker Value
Very High
CVE-2021-41648
Disclosure Date: October 01, 2021 (last updated February 23, 2025)
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
2
Attacker Value
Very High
CVE-2021-38840
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
SQL Injection can occur in Simple Water Refilling Station Management System 1.0 via the water_refilling/classes/Login.php username parameter.
2
Attacker Value
Very High
CVE-2021-38754
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
SQL Injection vulnerability in Hospital Management System due to lack of input validation in messearch.php.
2
Attacker Value
Very High
CVE-2021-35458
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
Online Pet Shop We App 1.0 is vulnerable to Union SQL Injection in products.php (aka p=products) via the c or s parameter.
2
Attacker Value
Very High
CVE-2020-16846 — SaltStack Unauthenticated Shell Injection
Disclosure Date: November 06, 2020 (last updated February 22, 2025)
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
1
Attacker Value
Unknown
CVE-2020-8794
Disclosure Date: February 25, 2020 (last updated February 21, 2025)
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
0
Attacker Value
Unknown
CVE-2019-6111
Disclosure Date: January 31, 2019 (last updated November 08, 2023)
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
3