CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2024-33575
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.05404
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
2024-04-29
Nuclei
null
CVE-2024-33605
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.57705
Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
2024-11-26
Nuclei
null
CVE-2024-33610
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.7969
"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refe...
2024-11-26
Nuclei
null
CVE-2024-3378
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
0.03566
A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotel...
2024-04-06
Nuclei
cpe:2.3:a:iboss:secure_web_gateway:*:*:*:*:*:*:*:*
CVE-2024-33832
6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
0.03512
OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info.
2024-04-30
Nuclei
null
CVE-2024-3393
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.6473
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mod...
2024-12-27
CISA
cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h...
CVE-2024-3400
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.94297
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW,...
2024-04-12
Metasploit/Nuclei/CISA
cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-...
CVE-2024-34061
4.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
0.17867
changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a...
2024-05-02
Nuclei
null
CVE-2024-3408
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.80941
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the appli...
2024-06-06
Metasploit
cpe:2.3:a:man:d-tale:3.10.0:*:*:*:*:*:*:*
CVE-2024-34102
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94093
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external en...
2024-06-13
Metasploit/Nuclei/CISA
cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-7:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.3...
CVE-2024-34257
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.88714
TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
2024-05-08
Nuclei
cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*;cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*
CVE-2024-34351
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.9232
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be origi...
2024-05-14
Nuclei
cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*
CVE-2024-34470
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
0.93626
An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the se...
2024-05-06
Nuclei
cpe:2.3:a:hsclabs:mailinspector:*:*:*:*:*:*:*:*
CVE-2024-3495
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93269
The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthe...
2024-05-22
Nuclei
null
CVE-2024-34982
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.8022
An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file.
2024-05-17
Nuclei
cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*
CVE-2024-35219
8.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
0.25497
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyo...
2024-05-27
Nuclei
null
CVE-2024-35250
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.47639
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
2024-06-11
Metasploit/CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-3552
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93576
The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
2024-06-13
Nuclei
cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*
CVE-2024-35584
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.72757
SQL injection vulnerabilities were discovered in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1 to 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application tak...
2024-10-15
Nuclei
cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*;cpe:2.3:a:os4ed:opensis:9.1:*:*:*:community:*:*:*
CVE-2024-35627
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.02181
tileserver-gl up to v4.4.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /data/v3/?key.
2024-05-22
Nuclei
null
CVE-2024-36104
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.93507
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue.
2024-06-04
Nuclei
cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
CVE-2024-36117
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
0.6574
Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no kno...
2024-06-19
Nuclei
cpe:2.3:a:reposilite:reposilite:*:*:*:*:*:*:*:*
CVE-2024-36401
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94425
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafel...
2024-07-01
Metasploit/Nuclei/CISA
cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:30.0:-:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:30.0:rc:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:31.0:-:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:31.0:rc:*:*:*:*:*:*
CVE-2024-36404
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.89435
GeoTools is an open source Java library that provides tools for geospatial data. Prior to versions 31.2, 30.4, and 29.6, Remote Code Execution (RCE) is possible if an application uses certain GeoTools functionality to evaluate XPath expressions supplied by user input. Versions 31.2, 30.4, and 29.6 contain a fix for thi...
2024-07-02
Nuclei
null
CVE-2024-36412
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.93615
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
2024-06-10
Nuclei
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
CVE-2024-36527
6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.87345
puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
2024-06-17
Nuclei
null
CVE-2024-3656
8.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
0.88292
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
2024-10-09
Nuclei
null
CVE-2024-36675
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.4284
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
2024-06-04
Nuclei
cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*
CVE-2024-36683
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
0.0058
SQL injection vulnerability in the module "Products Alert" (productsalert) before 1.7.4 from Smart Modules for PrestaShop allows attackers to obtain sensitive information and cause other impacts via the ProductsAlertAjaxProcessModuleFrontController::initContent method.
2024-06-24
Nuclei
null
CVE-2024-3673
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
0.82796
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
2024-08-30
Nuclei
cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:*
CVE-2024-36837
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.91665
SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file.
2024-06-05
Nuclei
cpe:2.3:a:crmeb:crmeb:5.2.2:*:*:*:*:*:*:*
CVE-2024-36857
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.19028
Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.
2024-06-04
Nuclei
cpe:2.3:a:homebrew:jan:0.4.12:*:*:*:*:*:*:*
CVE-2024-36858
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.65803
An arbitrary file upload vulnerability in the /v1/app/writeFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file.
2024-06-04
Nuclei
cpe:2.3:a:homebrew:jan:0.4.12:*:*:*:*:*:*:*
CVE-2024-36971
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.00075
In the Linux kernel, the following vulnerability has been resolved: net: fix __dst_negative_advice() race __dst_negative_advice() does not enforce proper RCU rules when sk->dst_cache must be cleared, leading to possible UAF. RCU rules are that we must first clear sk->sk_dst_cache, then call dst_release(old_dst). No...
2024-06-10
CISA
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2024-36991
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.93274
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows.
2024-07-01
Nuclei
cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CVE-2024-37032
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.93507
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
2024-05-31
Nuclei
cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*
CVE-2024-37081
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.5609
The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance.
2024-06-18
Metasploit
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*;cpe:2.3:a:vmware:vce...
CVE-2024-37085
6.8
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
0.65244
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by ...
2024-06-25
CISA
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:7.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8...
CVE-2024-37152
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.57299
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The vulnerability allows unauthorized access to the sensitive settings exposed by /api/v1/settings endpoint without authentication. All sensitive settings are hidden except passwordPattern. This vulnerability is fixed in 2.11.3, 2.10.12, and 2.9...
2024-06-06
Nuclei
cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
CVE-2024-37383
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.61419
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.
2024-06-07
CISA
cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CVE-2024-37393
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.82327
Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This...
2024-06-10
Nuclei
cpe:2.3:a:securenvoy:multi-factor_authentication_solutions:*:*:*:*:*:*:*:*
CVE-2024-37404
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.81509
Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution.
2024-10-18
Metasploit
cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*;cpe:2...
CVE-2024-3742
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.10226
Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system.
2024-04-18
Nuclei
null
CVE-2024-3753
5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
0.00572
The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
2024-07-13
Nuclei
cpe:2.3:a:kibokolabs:hostel:*:*:*:*:*:wordpress:*:*
CVE-2024-37843
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.87249
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
2024-06-25
Nuclei
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
CVE-2024-37881
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.03304
SiteGuard WP Plugin provides a functionality to customize the path to the login page wp-login.php and implements a measure to avoid redirection from other URLs. However, SiteGuard WP Plugin versions prior to 1.7.7 missed to implement a measure to avoid redirection from wp-register.php. As a result, the customized path ...
2024-06-19
Nuclei
null
CVE-2024-38014
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0957
Windows Installer Elevation of Privilege Vulnerability
2024-09-10
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;...
CVE-2024-38080
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.21965
Windows Hyper-V Elevation of Privilege Vulnerability
2024-07-09
CISA
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
CVE-2024-38094
7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.80789
Microsoft SharePoint Remote Code Execution Vulnerability
2024-07-09
CISA
cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
CVE-2024-38106
7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.00349
Windows Kernel Elevation of Privilege Vulnerability
2024-08-13
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-38107
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.02515
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
2024-08-13
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-38112
7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.92309
Windows MSHTML Platform Spoofing Vulnerability
2024-07-09
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;...
CVE-2024-38178
7.5
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.23635
Scripting Engine Memory Corruption Vulnerability
2024-08-13
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-38189
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.47597
Microsoft Project Remote Code Execution Vulnerability
2024-08-13
CISA
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:project_2016:*:*:*:*:*:*:*:*
CVE-2024-38193
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.65951
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
2024-08-13
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-38213
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
0.75065
Windows Mark of the Web Security Feature Bypass Vulnerability
2024-08-13
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:...
CVE-2024-38217
5.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
0.11696
Windows Mark of the Web Security Feature Bypass Vulnerability
2024-09-10
CISA
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x8...
CVE-2024-3822
4.8
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
0.004
The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
2024-05-15
Nuclei
cpe:2.3:a:mranderson:base64_encoderdecoder:*:*:*:*:*:wordpress:*:*
CVE-2024-38226
7.3
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
0.03751
Microsoft Publisher Security Feature Bypass Vulnerability
2024-09-10
CISA
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*;cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*;cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*;cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x86:*
CVE-2024-38288
7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.60458
A command-injection issue in the Certificate Signing Request (CSR) functionality in R-HUB TurboMeeting through 8.x allows authenticated attackers with administrator privileges to execute arbitrary commands on the underlying server as root.
2024-07-25
Nuclei
cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
CVE-2024-38289
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.81834
A boolean-based SQL injection issue in the Virtual Meeting Password (VMP) endpoint in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to extract hashed passwords from the database, and authenticate to the application, via crafted SQL input.
2024-07-25
Nuclei
cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
CVE-2024-38353
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.04254
CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images o...
2024-07-10
Nuclei
cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:*
CVE-2024-38472
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.89753
SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to...
2024-07-01
Nuclei
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
CVE-2024-38473
8.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
0.87109
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
2024-07-01
Nuclei
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
CVE-2024-38475
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.9375
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in serv...
2024-07-01
Nuclei/CISA
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*
CVE-2024-3848
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.73811
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This...
2024-05-16
Nuclei
cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*
CVE-2024-3850
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.05941
Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if...
2024-06-10
Nuclei
cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*;cpe:2.3:o:uniview:nvr301-04s2-p4_firmware:*:*:*:*:*:*:*:*
CVE-2024-38514
7.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.6547
NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported)...
2024-06-28
Nuclei
null
CVE-2024-38653
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.89123
XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server.
2024-08-14
Nuclei
cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*...
CVE-2024-38812
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.5942
The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
2024-09-17
CISA
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update2...
CVE-2024-38813
7.5
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.18601
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
2024-09-17
CISA
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update2...
CVE-2024-38816
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.93374
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. Specifica...
2024-09-13
Nuclei
null
CVE-2024-38856
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94336
Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the sc...
2024-08-05
Metasploit/Nuclei/CISA
cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
CVE-2024-39205
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.55982
An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request.
2024-10-28
Metasploit
null
CVE-2024-3922
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.89443
The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to appen...
2024-06-13
Nuclei
cpe:2.3:a:dokan:dokan_pro_plugin:*:*:*:*:*:wordpress:*:*
CVE-2024-39250
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.86121
EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface.
2024-07-22
Nuclei
cpe:2.3:a:efrotech:timetrax:8.3:*:*:*:*:*:*:*
CVE-2024-39713
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
0.88249
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.
2024-08-05
Nuclei
cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
CVE-2024-39717
7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.07064
The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-us...
2024-08-22
CISA
cpe:2.3:a:versa-networks:versa_director:21.2.2:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:21.2.3:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.1:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.2:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.3:*:*:*:*:*:*:*
CVE-2024-39887
4.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
0.51478
An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLO...
2024-07-16
Nuclei
cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
CVE-2024-39891
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.30621
In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information...
2024-07-02
CISA
cpe:2.3:a:twilio:authy:*:*:*:*:*:iphone_os:*:*;cpe:2.3:a:twilio:authy_authenticator:*:*:*:*:*:android:*:*
CVE-2024-39903
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
0.39222
Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory ...
2024-07-12
Nuclei
cpe:2.3:a:widgetti:solara:*:*:*:*:*:*:*:*
CVE-2024-39907
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.85243
1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no ...
2024-07-18
Nuclei
cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*
CVE-2024-39914
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93423
FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
2024-07-12
Nuclei
cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*
CVE-2024-40348
8.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
0.91593
An issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal.
2024-07-20
Nuclei
cpe:2.3:a:bazarr:bazarr:*:*:*:*:*:*:*:*
CVE-2024-4040
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94426
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server....
2024-04-22
Metasploit/Nuclei/CISA
cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
CVE-2024-40422
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.92575
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical sy...
2024-07-24
Nuclei
cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
CVE-2024-40711
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.58488
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
2024-09-07
Nuclei/CISA
cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:*
CVE-2024-40766
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.09998
An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS ...
2024-08-23
CISA
cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*;cpe:2...
CVE-2024-40890
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.24077
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST re...
2025-02-04
CISA
cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*;cpe:2...
CVE-2024-40891
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.43473
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
2025-02-04
CISA
cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*;cpe:2...
CVE-2024-41107
8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
0.92901
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and ...
2024-07-19
Nuclei
cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
CVE-2024-41628
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.84574
Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
2024-07-26
Nuclei
null
CVE-2024-41667
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.55215
OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default ...
2024-07-24
Nuclei
null
CVE-2024-41710
7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.19683
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot ...
2024-08-12
CISA
cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6915_sip:-:*...
CVE-2024-41713
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.93572
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrup...
2024-10-21
Nuclei/CISA
cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*
CVE-2024-41810
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.62288
Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redi...
2024-07-29
Nuclei
cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*
CVE-2024-41955
5.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N
0.11321
Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5.
2024-07-31
Nuclei
cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*
CVE-2024-42009
9.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
0.88575
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
2024-08-05
CISA
cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
CVE-2024-42365
7.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
0.34237
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because ...
2024-08-08
Metasploit
cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_as...
CVE-2024-4257
6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
0.9154
A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/deleteStudy.php. The manipulation of the argument documentUniqueId leads to sql injection. It is possible to initiate the attack remotely. The exploit has bee...
2024-04-27
Nuclei
null