Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2025-0675
Disclosure Date: February 07, 2025 (last updated February 07, 2025)
Multiple Elber products suffer from an unauthenticated device configuration and client-side hidden functionality disclosure.
0
Attacker Value
Unknown
CVE-2025-0674
Disclosure Date: February 07, 2025 (last updated February 07, 2025)
Multiple Elber products are affected by an authentication bypass
vulnerability which allows unauthorized access to the password
management functionality. Attackers can exploit this issue by
manipulating the endpoint to overwrite any user's password within the
system. This grants them unauthorized administrative access to protected
areas of the application, compromising the device's system security.
0
Attacker Value
Unknown
CVE-2023-32094
Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Felix Welberg Extended Post Status allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Extended Post Status: from n/a through 1.0.19.
0
Attacker Value
Unknown
CVE-2023-33924
Disclosure Date: November 06, 2023 (last updated November 10, 2023)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Felix Welberg SIS Handball allows SQL Injection.This issue affects SIS Handball: from n/a through 1.0.45.
0
Attacker Value
Unknown
CVE-2023-41684
Disclosure Date: October 10, 2023 (last updated October 13, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Felix Welberg SIS Handball plugin <= 1.0.45 versions.
0
Attacker Value
Unknown
CVE-2019-10685
Disclosure Date: May 24, 2019 (last updated November 08, 2023)
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Heidelberg Prinect Archiver v2013 release 1.0.
0
Attacker Value
Unknown
CVE-2002-2365
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Simple WAIS (SWAIS) 1.11 allows remote attackers to execute arbitrary commands via the shell metacharacters in the search field, as demonstrated using the "|" (pipe) character.
0