1722 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2023 — SUNNET WMPro portal's FAQ function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to obtain sensitive information via a database. La función de preguntas frecuentes del portal SUNNET WMPro no tiene una validación suficiente para la entrada del usuario. Un atacante remoto no autenticado puede inyectar comandos SQL arbitrarios para obtener información sensible a través de una base de datos. • https://www.twcert.org.tw/tw/cp-132-7372-3994a-1.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2023 — SUNNET WMPro portal's file management function has a vulnerability of insufficient filtering for user input. A remote attacker with administrator privilege or a privileged account can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operations or disrupt service. La función de administración de archivos del portal SUNNET WMPro tiene una vulnerabilidad de filtrado insuficiente para la entrada del usuario. Un atacante remoto con privilegios de administrado... • https://www.twcert.org.tw/tw/cp-132-7373-4ef46-1.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2023 — SUNNET CTMS has vulnerability of path traversal within its file uploading function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operation or disrupt service. • https://www.twcert.org.tw/tw/cp-132-7033-878ab-1.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

03 Jan 2022 — The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service. La función server-request receiver de Shockwall system presenta una vulnerabilidad de autenticación inapropiada. Un atacante a... • https://www.twcert.org.tw/tw/cp-132-5433-77f6f-1.html • CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

01 Dec 2021 — Sunnet eHRD e-mail delivery task schedule’s serialization function has inadequate input object validation and restriction, which allows a post-authenticated remote attacker with database access privilege, to execute arbitrary code and control the system or interrupt services. La función e-mail delivery task schedule’s serialization de Sunnet eHRD presenta una comprobación y restricción de objetos de entrada inapropiadas, que permite a un atacante remoto no autenticado con privilegios de acceso a la base de ... • https://www.twcert.org.tw/tw/cp-132-5355-6e339-1.html • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 0

01 Dec 2021 — Sunnet eHRD has broken access control vulnerability, which allows a remote attacker to access account management page after being authenticated as a general user, then perform privilege escalation to execute arbitrary code and control the system or interrupt services. Sunnet eHRD presenta una vulnerabilidad de control de acceso rota, que permite a un atacante remoto acceder a la página de administración de cuentas después de ser autenticado como usuario general, y luego llevar a cabo una escalada de privile... • https://www.twcert.org.tw/tw/cp-132-5354-0aac0-1.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

01 Dec 2021 — Sunnet eHRD has inadequate filtering for special characters in URLs, which allows a remote attacker to perform path traversal attacks without authentication, access restricted paths and download system files. Sunnet eHRD presenta un filtrado inapropiado de caracteres especiales en las URL, que permite a un atacante remoto llevar a cabo ataques de salto de ruta sin autenticación, acceder a rutas restringidas y descargar archivos del sistema • https://www.twcert.org.tw/tw/cp-132-5353-4ebee-1.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 3

14 May 2020 — Cellebrite UFED 5.0 to 7.5.0.845 implements local operating system policies that can be circumvented to obtain a command prompt via the Windows file dialog that is reachable via the Certificate-Based Authentication option of the Wireless Network Connection screen. Cellebrite UFED versiones 5.0 hasta 7.5.0.845, implementa políticas de sistema operativo local que pueden ser evitadas para obtener un símbolo del sistema por medio del cuadro de diálogo de archivos de Windows que es accesible mediante la opción C... • https://packetstorm.news/files/id/157715 • CWE-269: Improper Privilege Management •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

27 Mar 2020 — Sunnet eHRD, a human training and development management system, contains a vulnerability of Broken Access Control. After login, attackers can use a specific URL, access unauthorized functionality and data. Sunnet eHRD, un sistema de gestión de desarrollo y capacitación humana, contiene una vulnerabilidad de Control de Acceso Roto. Después de iniciar sesión, atacantes pueden usar una URL específica, acceder a una funcionalidad y a datos no autorizados. • https://www.chtsecurity.com/news/30772cf1-2e7e-4afe-9282-b5a196b22e71 • CWE-863: Incorrect Authorization •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

27 Mar 2020 — Sunnet eHRD, a human training and development management system, contains vulnerability of Cross-Site Scripting (XSS), attackers can inject arbitrary command into the system and launch XSS attack. Sunnet eHRD, un sistema de gestión de desarrollo y capacitación humana, contiene una vulnerabilidad de tipo Cross-Site Scripting (XSS), atacantes pueden inyectar comandos arbitrarios al sistema e iniciar un ataque de tipo XSS. • https://www.chtsecurity.com/news/30772cf1-2e7e-4afe-9282-b5a196b22e71 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •