Vulnerabilities > Improper Control of Resource Identifiers ('Resource Injection')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-30 | CVE-2024-0564 | Resource Injection vulnerability in multiple products A flaw was found in the Linux kernel's memory deduplication mechanism. | 6.5 |
2022-10-31 | CVE-2022-3774 | Resource Injection vulnerability in Train Scheduler APP Project Train Scheduler APP 1.0 A vulnerability was found in SourceCodester Train Scheduler App 1.0 and classified as critical. | 9.1 |
2022-04-12 | CVE-2022-27670 | Resource Injection vulnerability in SAP SQL Anywhere 17.0 SAP SQL Anywhere - version 17.0, allows an authenticated attacker to prevent legitimate users from accessing a SQL Anywhere database server by crashing the server with some queries that use indirect identifiers. | 4.0 |
2021-11-17 | CVE-2021-42360 | Resource Injection vulnerability in Brainstormforce Starter Templates On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. | 3.5 |
2019-05-16 | CVE-2019-1860 | Resource Injection vulnerability in Cisco Unified Intelligence Center 12.0(1) A vulnerability in the dashboard gadget rendering of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to obtain or manipulate sensitive information between a user’s browser and Cisco Unified Intelligence Center. | 4.0 |
2018-08-01 | CVE-2016-8615 | Resource Injection vulnerability in Haxx Curl A flaw was found in curl before version 7.51. | 7.5 |
2017-02-13 | CVE-2017-5159 | Resource Injection vulnerability in Phoenixcontact Mguard Firmware 8.4.0 An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. | 7.5 |