A vulnerability has been found in Code4Berry Decoration Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /decoration/admin/btndates_report.php of the component Between Dates Reports. The manipulation of the argument fromdate/todate leads to sql injection.
This vulnerability was named CVE-2024-11487. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in Code4Berry Decoration Management System 1.0. This affects an unknown part of the file /decoration/admin/user_permission.php of the component User Permission Handler. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2024-11486. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in Code4Berry Decoration Management System 1.0. Affected by this issue is some unknown functionality of the file /decoration/admin/userregister.php of the component User Handler. The manipulation leads to permission issues.
This vulnerability is handled as CVE-2024-11485. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in Code4Berry Decoration Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /decoration/admin/update_image.php of the component User Image Handler. The manipulation of the argument productimage1 leads to improper access controls.
This vulnerability is known as CVE-2024-11484. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in Rakuten Mobile Rakuten Turbo 5G up to 1.3.18. Affected is an unknown function. The manipulation leads to exposure of sensitive system information to an unauthorized control sphere.
This vulnerability is traded as CVE-2024-52033. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Rakuten Mobile Rakuten Turbo 5G up to 1.3.18. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2024-48895. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Rakuten Mobile Rakuten Turbo 5G up to 1.3.18. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to missing authentication.
This vulnerability was named CVE-2024-47865. The attack can be initiated remotely. There is no exploit available.
Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors.