BlackBerry CylanceOPTICS versions prior to 3.3 MR2 and 3.2 MR5 suffer from an uninstall password bypass vulnerability.
0a06d0ec45010ea8b159f9d5f9a891450ce9117faadcb6b526ef6e7aa21a7451
Sistem Penyewaan Baju atau Pakaian Berbasis Web version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
6bf344eafaf6c191620e5d4aaa4bda969218a3a332ca545a121590babfb99c51
Simple Music Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
4c3954a6782826d528b447fdf6dbcdb599551c16726f02aaebd273c7dff238b7
SchoolPlus version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
d2074cc8545a505ce1af1c27f59e640d90c6c616fbd247a73c1d9f5cea3d3385
Sample Blog Site version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
61eda3f220bcfb474e61a383d157f7559eaabd352c4d5b1a930e8077c163d977
Responsive Binary mlm version 3.2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
7832158bdfb6f25736475de94f715b561965469ceb63c7f42c224430b50843df
Responsive Billing sw System version 3.2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
a0219dae7fd1734f734512e67150e374366e1b2cf6be0d9351c5231f163d3f5a
A mitigation bypass / privilege escalation flaw has been discovered in Apple's iOS Screen Time functionality, granting one access to modify the restrictions. It allows a local attacker to acquire the Screen Time Passcode by bypassing the anti-bruteforce protections on the four-digit Passcode, and in consequence gaining total control over Screen Time (Parental Control) settings. Versions lower than 18 are affected.
75666d1dc71fb63eadc1180b8fde8bebebfa673977a37f948bb5e8bd009bd6f8
Registration and Login System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
2e35be6bb3e35b83df484b398806d8bfeabf871143cdfbe23a59f0b553cfe4a3
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
90fa6e298ae065b4008c1d60bd78433fa45a22aa60cd8bebf84446f57604ab27
PreSchool Enrollment System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
e1fbcafe51ae8933b602e68cc0b8cf59c74e03889e52ffe1f5161a5b0fa4c9ef
Online Food Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
760d304391c04fae57c6cedc425f5688dbb8eb4172d1923a58e639711230ce6e
Backdoor.Win32.CCInvader.10 malware suffers from a bypass vulnerability.
7f8fbab739d2fc6fb8f975250a5f1be05abc1adfae0b192591971bf6f66b9101
Online Bus Ticket Booking Website version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
07cf01fe4d4e0156b5b9d3867b0d730760e244d75733bd6a21e9831bb21eb671
Nipah Virus Testing Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
002fc73bbeed6a4576cfdb9982299838050b0bbc1adfeda7fc7c091a4c710fb3
Membership Management System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
6a15cdedf00f0b752cebff83c346b7c042814e903684ee4884b3896ad044391b
Beauty Parlour and Saloon Management System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
fad953e88b1363e3d2707ad2334000c4afb714007867a1948bfe937b7b9b846b
Emergency Ambulance Hiring Portal version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
6cc9519a5a47d6de98282e14b498e5ca4044959e97c7129c7b172fc06c9d0eba
BP Monitoring Management System version 1.0 version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
aa30837cf16b6046be2fbcc93cf45d15d653bb896889d1c8eb504254cfc40ad4
Auto/Taxi Stand Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
5bfb04fe73b1ba3334cfb80bd85d482d463f62029298535a09ed53c1a5e5c485
Red Hat Security Advisory 2024-6501-03 - New Red Hat build of Keycloak 22.0.12 packages are available from the Customer Portal. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.
7c20ef0e4508b339e4f572c98b8ae892e21dbb1baef9fb0cafea8e7322d6173e
Red Hat Security Advisory 2024-6500-03 - New images are available for Red Hat build of Keycloak 22.0.12 and Red Hat build of Keycloak 22.0.12 Operator, running on OpenShift Container Platform. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.
3d0f74993836983ce5e05180cb4aab02b685e8df8c104d6efcc4efff4200d794
Red Hat Security Advisory 2024-6499-03 - A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Issues addressed include a bypass vulnerability.
6e72327137f256313005f38a55bfcc67c52f3c20354f53aab956dd4c4b484e14
Red Hat Security Advisory 2024-6497-03 - A new image is available for Red Hat Single Sign-On 7.6.10, running on OpenShift Container Platform 3.10 and 3.11, and 4.3. This is a security update with Moderate impact rating. Issues addressed include a bypass vulnerability.
48a1fc7c4b98e9e44039fc4fb594f3995d0a9a16ddcfb272b4b042e07833d5ee
Red Hat Security Advisory 2024-6495-03 - New Red Hat Single Sign-On 7.6.10 packages are now available for Red Hat Enterprise Linux 9. Issues addressed include a bypass vulnerability.
1122d48eeaf1bf744d6d15b3db19522faf3a4a58f0502e1fd2e230a60d24cba1