CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
In xckk v9.6, there is a SQL injection vulnerability in which the cond parameter in notice/list is not securely filtered, resulting in a SQL injection vulnerability. |
SourceCodester Pet Grooming Management Software 1.0 is vulnerable to SQL Injection in admin/view_customer.php via the ID parameter. |
A vulnerability was found in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this issue is some unknown functionality of the file /htdocs/manageFilesFolders.php. Performing manipulation results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Permission control vulnerability in the Gallery module. Successful exploitation of this vulnerability may affect service confidentiality |
Identity authentication bypass vulnerability in the Gallery app. Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the camera module. Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service confidentiality. |
Permission control vulnerability in the media module. Successful exploitation of this vulnerability may affect service confidentiality. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Use After Free (UAF) vulnerability in the office service. Successful exploitation of this vulnerability may affect service confidentiality. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the development framework module. Successful exploitation of this vulnerability may affect availability. |
Buffer overflow vulnerability in the sensor service. Successful exploitation of this vulnerability may affect availability. |
Data processing error vulnerability in the package management module. Successful exploitation of this vulnerability may affect availability. |
Use After Free (UAF) vulnerability in the storage management module. Successful exploitation of this vulnerability may affect availability. |
Vulnerability of improper exception handling in the print module. Successful exploitation of this vulnerability may affect availability. |