Page 2 of 30 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro Smart S150 Management Platform up to 20240101. It has been rated as critical. Affected by this issue is some unknown functionality of the file /useratte/userattestation.php of the component HTTP POST Request Handler. The manipulation of the argument web_img leads to unrestricted upload. The attack may be launched remotely. • https://github.com/tolkent/cve/blob/main/upload.md https://vuldb.com/?ctiid.249866 https://vuldb.com/?id.249866 https://vuldb.com/?submit.260962 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability classified as critical has been found in Byzoro S210 up to 20231210. Affected is an unknown function of the file /importexport.php. The manipulation of the argument sql leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Stitch3612/cve/blob/main/rce.md https://vuldb.com/?ctiid.248688 https://vuldb.com/?id.248688 https://vuldb.com/?submit.250043 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. • https://github.com/kpz-wm/cve/blob/main/Any_file_read.md https://vuldb.com/?ctiid.247157 https://vuldb.com/?id.247157 https://vuldb.com/?submit.243584 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro S210 up to 20231123. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php of the component HTTP POST Request Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. • https://github.com/willchen0011/cve/blob/main/upload.md https://vuldb.com/?ctiid.247156 https://vuldb.com/?id.247156 https://vuldb.com/?submit.242777 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro S210 up to 20231121. It has been classified as critical. This affects an unknown part of the file /Tool/repair.php of the component HTTP POST Request Handler. The manipulation of the argument txt leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/houhuidong/cve/blob/main/rce.md https://vuldb.com/?ctiid.247155 https://vuldb.com/?id.247155 https://vuldb.com/?submit.241692 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •