C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a command injection vulnerability.
e6ab13a0246110b44dcdf4979931f3c724f8288c7be0ae45d14d5e88b8828ed4
C-MOR Video Surveillance version 5.2401 makes use of unmaintained vulnerability third-party components.
50868d349c84704995bd17063b29d34678bda3760321be0ea29d00df62e4fce6
C-MOR Video Surveillance versions 5.2401 and 6.00PL01 stores sensitive information, such as credentials, in clear text.
8db1a14276a8b4afd861e338c4174f26f883c0e15f48c5cde474fcac3953dedd
C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from an improper privilege management vulnerability that can allows for privilege escalation.
2f2ea225657058c95e1bc52540ab6b85b8f472f2bc7c04ebb877194055c37e90
C-MOR Video Surveillance version 5.2401 suffers from a remote shell upload vulnerability.
787e5049c9d126f909aa923e05bb07cd07413bc5154345d71f346e74ec5c9114
C-MOR Video Surveillance version 5.2401 suffers from a path traversal vulnerability.
6fe58f550278f2bf7107e64be242c5fbad1b8ffd839d50b19fc56c102e4780e2
C-MOR Video Surveillance version 5.2401 suffers from an improper access control privilege escalation vulnerability that allows for a lower privileged user to access administrative functions.
32777de2ae7cbdb7a5ea02bd7eb88688b8d67865352de7b14c8e41c4d0568f1a
C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a remote SQL injection vulnerability.
3631436bc00a5ef9505d823e81f823511bc49dc2698141fab1c6e02a8b517a74
C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a cross site request forgery vulnerability.
280ac578aec4b568b932c6180b77dd607186ef35d18e5d6e3f81d7c2e2a25b04
C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a persistent cross site scripting vulnerability.
1c20fdc720d1f9d37d1f2af502f48729eb04135e13883038d161f9835b8b3f55
C-MOR Video Surveillance version 5.2401 suffers from a reflective cross site scripting vulnerability.
b6dd21760972bd50552c5c42a0225c1feee7b02dec561b4da5ec6673a6543af4
Ubuntu Security Notice 6991-1 - It was discovered that AIOHTTP did not properly restrict file access when the 'follow_symlinks' option was set to True. A remote attacker could possibly use this issue to access unauthorized files on the system.
5086a612b030dfb3ae7737ae3449c9df89010cef59afa6efb9fbaf45b83ffb72
Red Hat Security Advisory 2024-6438-03 - An update for wget is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
a214379cdf5bfcdc1a35e52e830d5f5bc125fd818cca7b406245629903273509
Travel version 1.0 suffers from a remote shell upload vulnerability.
e1c910902237872a9a7ebb40f19760f24f84f89e4b7e66a2979867c3d7860ef2
Red Hat Security Advisory 2024-6422-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.
1f6fcd26158054d26234768c09f4c804ad98df42de39c8f20984547783fadba2
Webpay E-Commerce version 1.0 suffers from an ignored default credential vulnerability.
0a2cdc637a85014c256571ab2eb19dd8dd8b45d02c59e07da79f3de235193b79
Red Hat Security Advisory 2024-6420-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
b6be755df56021882e728db277d7bf44f5aba332bcfe8e38bbb28650d0563230
SPIP version 4.2.12 suffers from a code execution vulnerability.
4f6e93dcf418dfadc5d1f98f741eefce85aa39bb2208145b06e1fbe8c74a4707
Online Sports Complex Booking System version 1.0 suffers from an ignored default credential vulnerability.
7ef39718e1694996d6c3234f87defd525659e7cde8353fa86e03c43c5fd1bf04
Red Hat Security Advisory 2024-6419-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
4f538f86cba0dda567d73a11d02e64c023a6047182f8d58af7b6d5bb99d507f2
Online Shopping Portal Project version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2aaf65cb555486e2820ada0ce32bf28469f0c31b148f9f82386b338d41703ea5
Red Hat Security Advisory 2024-6418-03 - An update for bubblewrap and flatpak is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service.
174efc8a6f673a2798f5de3d2b700b99d010cb972662340596a1b4e2dac9dc1b
Red Hat Security Advisory 2024-6417-03 - An update for flatpak is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
5e181a4831e2508e1bddd4307f41d0c23ab6c7abc370c2b56ee7ffb632a5895b
Online Pizza Ordering System version 1.0 suffers from an ignored default credential vulnerability.
ea183be601d90798e6a525ee32f1811b36b16ef45e82b7172ff7fd9dada60b8e
File Management System version 1.0 suffers from an insecure direct object reference vulnerability.
80d45521f02111223db9c15921f68ebb49c243151cc2e7da343578636283f910