VDB-248846 is the identifier assigned to this vulnerability.Ī vulnerable API method in M-Files Server before 5.0 allows for uncontrolled resource consumption. The exploit has been disclosed to the public and may be used. The manipulation of the argument pt leads to cross site scripting. Affected by this issue is some unknown functionality of the file /main/checkout.php. To exploit this vulnerability, the attacker must have valid administrative credentials for the device.Ī vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as problematic. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. This vulnerability is due to improper validation of user-supplied input. A vulnerability in the web-based management interface of the Cisco WAP371 Wireless-AC/N Dual Radio Access Point (AP) with Single Point Setup could allow an authenticated, remote attacker to perform command injection attacks against an affected device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |