Page 11 of 298 results (0.003 seconds)

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "ord". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. Una petición HTTP especialmente diseñada puede conllevar a una inyección SQL. Un atacante puede realizar peticiones HTTP autenticadas para desencadenar esta vulnerabilidad en el parámetro "name_filter". • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. Se presenta una vulnerabilidad de inyección SQL explotable en la página "group_list" de Advantech R-SeeNet versión 2.4.15 (30.07.2021). • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •