CVE-2017-20021
- EPSS 0.38%
- Veröffentlicht 09.06.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 03:22:27
A vulnerability, which was classified as critical, was found in Solare Solar-Log 2.8.4-56/3.5.2-85. This affects an unknown part of the component File Upload. The manipulation leads to privilege escalation. It is possible to initiate the attack remot...
CVE-2017-20023
- EPSS 0.31%
- Veröffentlicht 09.06.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 03:22:28
A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85 and classified as critical. This issue affects some unknown processing of the component Network Config. The manipulation leads to privilege escalation. The attack may be initiated remote...
CVE-2017-20024
- EPSS 0.43%
- Veröffentlicht 09.06.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 03:22:28
A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 3...
CVE-2017-20025
- EPSS 0.35%
- Veröffentlicht 09.06.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 03:22:28
A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Flash Memory. The manipulation leads to privilege escalation. The attack ca...
CVE-2017-20019
- EPSS 0.27%
- Veröffentlicht 09.06.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 03:22:27
A vulnerability classified as problematic was found in Solare Solar-Log 2.8.4-56/3.5.2-85. Affected by this vulnerability is an unknown functionality of the component Config Handler. The manipulation leads to information disclosure. The attack can be...
CVE-2017-20020
- EPSS 0.13%
- Veröffentlicht 09.06.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 03:22:27
A vulnerability, which was classified as problematic, has been found in Solare Solar-Log 2.8.4-56/3.5.2-85. Affected by this issue is some unknown functionality. The manipulation leads to cross site request forgery. The attack may be launched remotel...