![]() ![]() The identifier VDB-241645 was assigned to this vulnerability. The exploit has been disclosed to the public and may be used. The manipulation of the argument file_upload leads to unrestricted upload. Affected by this vulnerability is an unknown functionality of the file /useratte/web.php. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. VDB-241646 is the identifier assigned to this vulnerability. The manipulation of the argument file leads to os command injection. Affected by this issue is some unknown functionality of the file /log/download.php. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. The associated identifier of this vulnerability is VDB-241647. It is possible to initiate the attack remotely. The manipulation of the argument searchdata/searchdata/searchdata leads to sql injection. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. ![]() A vulnerability was found in QDocs Smart School 6.4.1. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |