CVE-2022-46370
Rumpus – FTP server version 9.0.7.1 Improper Token Verification– vulnerability may allow bypassing identity verification.
Source: CVE-2022-46370
CVE-2022-46370
Rumpus – FTP server version 9.0.7.1 Improper Token Verification– vulnerability may allow bypassing identity verification.
Source: CVE-2022-46370
CVE-2022-46372
Alotcer – AR7088H-A firmware version 16.10.3 Command execution Improper validation of unspecified input field may allow Authenticated command execution.
Source: CVE-2022-46372
CVE-2022-46369
Rumpus – FTP server version 9.0.7.1 Persistent cross-site scripting (PXSS) – vulnerability may allow inserting scripts into unspecified input fields.
Source: CVE-2022-46369
CVE-2022-46371
Alotcer – AR7088H-A firmware version 16.10.3 Information disclosure. Unspecified error message contains the default administrator user name.
Source: CVE-2022-46371
CVE-2022-39184
EXFO – BV-10 Performance Endpoint Unit authentication bypass User can manually manipulate access enabling authentication bypass.
Source: CVE-2022-39184
CVE-2022-39185
EXFO – BV-10 Performance Endpoint Unit Undocumented privileged user. Unit has an undocumented hard-coded privileged user.
Source: CVE-2022-39185
CVE-2013-10011
A vulnerability was found in aeharding classroom-engagement-system and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection. The attack may be launched remotely. The name of the patch is 096de5815c7b414e7339f3439522a446098fb73a. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218156.
Source: CVE-2013-10011
CVE-2022-39183
Moodle Plugin – SAML Auth may allow Open Redirect through unspecified vectors.
Source: CVE-2022-39183
CVE-2022-39182
H C Mingham-Smith Ltd – Tardis 2000 Privilege escalation.Version 1.6 is vulnerable to privilege escalation which may allow a malicious actor to gain system privileges.
Source: CVE-2022-39182
CVE-2012-10005
A vulnerability has been found in manikandan170890 php-form-builder-class and classified as problematic. Affected by this vulnerability is an unknown functionality of the file PFBC/Element/Textarea.php of the component Textarea Handler. The manipulation of the argument value leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 74897993818d826595fd5857038e6703456a594a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218155.
Source: CVE-2012-10005