CVE stringlengths 13 16 | CVSS Score float64 0 10 | CVSS_Vector stringclasses 257
values | EPSS float64 0 0.95 | Description stringlengths 28 3.79k | Published stringdate 1990-08-14 00:00:00 2025-10-05 00:00:00 | Source stringclasses 7
values | CPE stringlengths 33 51k ⌀ |
|---|---|---|---|---|---|---|---|
CVE-2024-33575 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | 0.05404 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
| 2024-04-29 | Nuclei | null |
CVE-2024-33605 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.57705 | Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]. | 2024-11-26 | Nuclei | null |
CVE-2024-33610 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.7969 | "sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refe... | 2024-11-26 | Nuclei | null |
CVE-2024-3378 | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N | 0.03566 | A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotel... | 2024-04-06 | Nuclei | cpe:2.3:a:iboss:secure_web_gateway:*:*:*:*:*:*:*:* |
CVE-2024-33832 | 6.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L | 0.03512 | OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info. | 2024-04-30 | Nuclei | null |
CVE-2024-3393 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 0.6473 | A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mod... | 2024-12-27 | CISA | cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h... |
CVE-2024-3400 | 10 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | 0.94297 | A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW,... | 2024-04-12 | Metasploit/Nuclei/CISA | cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*;cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-... |
CVE-2024-34061 | 4.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N | 0.17867 | changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a... | 2024-05-02 | Nuclei | null |
CVE-2024-3408 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.80941 | man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the appli... | 2024-06-06 | Metasploit | cpe:2.3:a:man:d-tale:3.10.0:*:*:*:*:*:*:* |
CVE-2024-34102 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.94093 | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external en... | 2024-06-13 | Metasploit/Nuclei/CISA | cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.2:ext-7:*:*:*:*:*:*;cpe:2.3:a:adobe:commerce:2.4.3... |
CVE-2024-34257 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.88714 | TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges. | 2024-05-08 | Nuclei | cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*;cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:* |
CVE-2024-34351 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.9232 | Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be origi... | 2024-05-14 | Nuclei | cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:* |
CVE-2024-34470 | 8.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N | 0.93626 | An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the se... | 2024-05-06 | Nuclei | cpe:2.3:a:hsclabs:mailinspector:*:*:*:*:*:*:*:* |
CVE-2024-3495 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.93269 | The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthe... | 2024-05-22 | Nuclei | null |
CVE-2024-34982 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.8022 | An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file. | 2024-05-17 | Nuclei | cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:* |
CVE-2024-35219 | 8.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H | 0.25497 | OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyo... | 2024-05-27 | Nuclei | null |
CVE-2024-35250 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.47639 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 2024-06-11 | Metasploit/CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-3552 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.93576 | The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based. | 2024-06-13 | Nuclei | cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:* |
CVE-2024-35584 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.72757 | SQL injection vulnerabilities were discovered in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1 to 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application tak... | 2024-10-15 | Nuclei | cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*;cpe:2.3:a:os4ed:opensis:9.1:*:*:*:community:*:*:* |
CVE-2024-35627 | 6.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 0.02181 | tileserver-gl up to v4.4.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /data/v3/?key. | 2024-05-22 | Nuclei | null |
CVE-2024-36104 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.93507 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14.
Users are recommended to upgrade to version 18.12.14, which fixes the issue. | 2024-06-04 | Nuclei | cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* |
CVE-2024-36117 | 8.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L | 0.6574 | Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no kno... | 2024-06-19 | Nuclei | cpe:2.3:a:reposilite:reposilite:*:*:*:*:*:*:*:* |
CVE-2024-36401 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.94425 | GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafel... | 2024-07-01 | Metasploit/Nuclei/CISA | cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:30.0:-:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:30.0:rc:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:31.0:-:*:*:*:*:*:*;cpe:2.3:a:geotools:geotools:31.0:rc:*:*:*:*:*:* |
CVE-2024-36404 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.89435 | GeoTools is an open source Java library that provides tools for geospatial data. Prior to versions 31.2, 30.4, and 29.6, Remote Code Execution (RCE) is possible if an application uses certain GeoTools functionality to evaluate XPath expressions supplied by user input. Versions 31.2, 30.4, and 29.6 contain a fix for thi... | 2024-07-02 | Nuclei | null |
CVE-2024-36412 | 10 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | 0.93615 | SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue. | 2024-06-10 | Nuclei | cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:* |
CVE-2024-36527 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N | 0.87345 | puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server. | 2024-06-17 | Nuclei | null |
CVE-2024-3656 | 8.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N | 0.88292 | A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise. | 2024-10-09 | Nuclei | null |
CVE-2024-36675 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.4284 | LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function. | 2024-06-04 | Nuclei | cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:* |
CVE-2024-36683 | 7.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | 0.0058 | SQL injection vulnerability in the module "Products Alert" (productsalert) before 1.7.4 from Smart Modules for PrestaShop allows attackers to obtain sensitive information and cause other impacts via the ProductsAlertAjaxProcessModuleFrontController::initContent method. | 2024-06-24 | Nuclei | null |
CVE-2024-3673 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H | 0.82796 | The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues. | 2024-08-30 | Nuclei | cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:*:wordpress:*:* |
CVE-2024-36837 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.91665 | SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file. | 2024-06-05 | Nuclei | cpe:2.3:a:crmeb:crmeb:5.2.2:*:*:*:*:*:*:* |
CVE-2024-36857 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.19028 | Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface. | 2024-06-04 | Nuclei | cpe:2.3:a:homebrew:jan:0.4.12:*:*:*:*:*:*:* |
CVE-2024-36858 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.65803 | An arbitrary file upload vulnerability in the /v1/app/writeFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file. | 2024-06-04 | Nuclei | cpe:2.3:a:homebrew:jan:0.4.12:*:*:*:*:*:*:* |
CVE-2024-36971 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.00075 | In the Linux kernel, the following vulnerability has been resolved:
net: fix __dst_negative_advice() race
__dst_negative_advice() does not enforce proper RCU rules when
sk->dst_cache must be cleared, leading to possible UAF.
RCU rules are that we must first clear sk->sk_dst_cache,
then call dst_release(old_dst).
No... | 2024-06-10 | CISA | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
CVE-2024-36991 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.93274 | In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. | 2024-07-01 | Nuclei | cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
CVE-2024-37032 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.93507 | Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring. | 2024-05-31 | Nuclei | cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:* |
CVE-2024-37081 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.5609 | The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance. | 2024-06-18 | Metasploit | cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*;cpe:2.3:a:vmware:vce... |
CVE-2024-37085 | 6.8 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H | 0.65244 | VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by ... | 2024-06-25 | CISA | cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:7.0:*:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*;cpe:2.3:o:vmware:esxi:8... |
CVE-2024-37152 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | 0.57299 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The vulnerability allows unauthorized access to the sensitive settings exposed by /api/v1/settings endpoint without authentication. All sensitive settings are hidden except passwordPattern. This vulnerability is fixed in 2.11.3, 2.10.12, and 2.9... | 2024-06-06 | Nuclei | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* |
CVE-2024-37383 | 6.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 0.61419 | Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes. | 2024-06-07 | CISA | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
CVE-2024-37393 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.82327 | Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This... | 2024-06-10 | Nuclei | cpe:2.3:a:securenvoy:multi-factor_authentication_solutions:*:*:*:*:*:*:*:* |
CVE-2024-37404 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.81509 | Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution. | 2024-10-18 | Metasploit | cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*;cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*;cpe:2... |
CVE-2024-3742 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.10226 | Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system. | 2024-04-18 | Nuclei | null |
CVE-2024-3753 | 5.9 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L | 0.00572 | The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | 2024-07-13 | Nuclei | cpe:2.3:a:kibokolabs:hostel:*:*:*:*:*:wordpress:*:* |
CVE-2024-37843 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.87249 | Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint. | 2024-06-25 | Nuclei | cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:* |
CVE-2024-37881 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | 0.03304 | SiteGuard WP Plugin provides a functionality to customize the path to the login page wp-login.php and implements a measure to avoid redirection from other URLs. However, SiteGuard WP Plugin versions prior to 1.7.7 missed to implement a measure to avoid redirection from wp-register.php. As a result, the customized path ... | 2024-06-19 | Nuclei | null |
CVE-2024-38014 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.0957 | Windows Installer Elevation of Privilege Vulnerability | 2024-09-10 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;... |
CVE-2024-38080 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.21965 | Windows Hyper-V Elevation of Privilege Vulnerability | 2024-07-09 | CISA | cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* |
CVE-2024-38094 | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 0.80789 | Microsoft SharePoint Remote Code Execution Vulnerability | 2024-07-09 | CISA | cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*;cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* |
CVE-2024-38106 | 7 | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.00349 | Windows Kernel Elevation of Privilege Vulnerability | 2024-08-13 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-38107 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.02515 | Windows Power Dependency Coordinator Elevation of Privilege Vulnerability | 2024-08-13 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-38112 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | 0.92309 | Windows MSHTML Platform Spoofing Vulnerability | 2024-07-09 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;... |
CVE-2024-38178 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | 0.23635 | Scripting Engine Memory Corruption Vulnerability | 2024-08-13 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-38189 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 0.47597 | Microsoft Project Remote Code Execution Vulnerability | 2024-08-13 | CISA | cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*;cpe:2.3:a:microsoft:project_2016:*:*:*:*:*:*:*:* |
CVE-2024-38193 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.65951 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2024-08-13 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-38213 | 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N | 0.75065 | Windows Mark of the Web Security Feature Bypass Vulnerability | 2024-08-13 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*;cpe:2.3:... |
CVE-2024-38217 | 5.4 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L | 0.11696 | Windows Mark of the Web Security Feature Bypass Vulnerability | 2024-09-10 | CISA | cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*;cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x8... |
CVE-2024-3822 | 4.8 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N | 0.004 | The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | 2024-05-15 | Nuclei | cpe:2.3:a:mranderson:base64_encoderdecoder:*:*:*:*:*:wordpress:*:* |
CVE-2024-38226 | 7.3 | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H | 0.03751 | Microsoft Publisher Security Feature Bypass Vulnerability | 2024-09-10 | CISA | cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*;cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*;cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*;cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x64:*;cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:x86:* |
CVE-2024-38288 | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 0.60458 | A command-injection issue in the Certificate Signing Request (CSR) functionality in R-HUB TurboMeeting through 8.x allows authenticated attackers with administrator privileges to execute arbitrary commands on the underlying server as root. | 2024-07-25 | Nuclei | cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:* |
CVE-2024-38289 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.81834 | A boolean-based SQL injection issue in the Virtual Meeting Password (VMP) endpoint in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to extract hashed passwords from the database, and authenticate to the application, via crafted SQL input. | 2024-07-25 | Nuclei | cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:* |
CVE-2024-38353 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | 0.04254 | CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images o... | 2024-07-10 | Nuclei | cpe:2.3:a:hackmd:codimd:*:*:*:*:*:*:*:* |
CVE-2024-38472 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.89753 | SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content
Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to... | 2024-07-01 | Nuclei | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* |
CVE-2024-38473 | 8.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H | 0.87109 | Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue. | 2024-07-01 | Nuclei | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* |
CVE-2024-38475 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.9375 | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
Substitutions in serv... | 2024-07-01 | Nuclei/CISA | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*;cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:* |
CVE-2024-3848 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.73811 | A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This... | 2024-05-16 | Nuclei | cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:* |
CVE-2024-3850 | 5.4 | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N | 0.05941 | Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if... | 2024-06-10 | Nuclei | cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*;cpe:2.3:o:uniview:nvr301-04s2-p4_firmware:*:*:*:*:*:*:*:* |
CVE-2024-38514 | 7.4 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.6547 | NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported)... | 2024-06-28 | Nuclei | null |
CVE-2024-38653 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.89123 | XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server. | 2024-08-14 | Nuclei | cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:*;cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*... |
CVE-2024-38812 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.5942 | The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. | 2024-09-17 | CISA | cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update2... |
CVE-2024-38813 | 7.5 | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.18601 | The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. | 2024-09-17 | CISA | cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*;cpe:2.3:a:vmware:vcenter_server:7.0:update2... |
CVE-2024-38816 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.93374 | Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
Specifica... | 2024-09-13 | Nuclei | null |
CVE-2024-38856 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.94336 | Incorrect Authorization vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: through 18.12.14.
Users are recommended to upgrade to version 18.12.15, which fixes the issue.
Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the sc... | 2024-08-05 | Metasploit/Nuclei/CISA | cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:* |
CVE-2024-39205 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.55982 | An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request. | 2024-10-28 | Metasploit | null |
CVE-2024-3922 | 10 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | 0.89443 | The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to appen... | 2024-06-13 | Nuclei | cpe:2.3:a:dokan:dokan_pro_plugin:*:*:*:*:*:wordpress:*:* |
CVE-2024-39250 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.86121 | EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface. | 2024-07-22 | Nuclei | cpe:2.3:a:efrotech:timetrax:8.3:*:*:*:*:*:*:* |
CVE-2024-39713 | 8.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N | 0.88249 | A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1. | 2024-08-05 | Nuclei | cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:* |
CVE-2024-39717 | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 0.07064 | The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The “Change Favicon” (Favorite Icon) option can be mis-us... | 2024-08-22 | CISA | cpe:2.3:a:versa-networks:versa_director:21.2.2:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:21.2.3:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.1:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.2:*:*:*:*:*:*:*;cpe:2.3:a:versa-networks:versa_director:22.1.3:*:*:*:*:*:*:* |
CVE-2024-39887 | 4.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N | 0.51478 | An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLO... | 2024-07-16 | Nuclei | cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:* |
CVE-2024-39891 | 5.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | 0.30621 | In the Twilio Authy API, accessed by Authy Android before 25.1.0 and Authy iOS before 26.1.0, an unauthenticated endpoint provided access to certain phone-number data, as exploited in the wild in June 2024. Specifically, the endpoint accepted a stream of requests containing phone numbers, and responded with information... | 2024-07-02 | CISA | cpe:2.3:a:twilio:authy:*:*:*:*:*:iphone_os:*:*;cpe:2.3:a:twilio:authy_authenticator:*:*:*:*:*:android:*:* |
CVE-2024-39903 | 8.6 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L | 0.39222 | Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory ... | 2024-07-12 | Nuclei | cpe:2.3:a:widgetti:solara:*:*:*:*:*:*:*:* |
CVE-2024-39907 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.85243 | 1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no ... | 2024-07-18 | Nuclei | cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:* |
CVE-2024-39914 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.93423 | FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34. | 2024-07-12 | Nuclei | cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:* |
CVE-2024-40348 | 8.2 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L | 0.91593 | An issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal. | 2024-07-20 | Nuclei | cpe:2.3:a:bazarr:bazarr:*:*:*:*:*:*:*:* |
CVE-2024-4040 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.94426 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.... | 2024-04-22 | Metasploit/Nuclei/CISA | cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:* |
CVE-2024-40422 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.92575 | The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical sy... | 2024-07-24 | Nuclei | cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:* |
CVE-2024-40711 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.58488 | A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE). | 2024-09-07 | Nuclei/CISA | cpe:2.3:a:veeam:veeam_backup_\&_replication:*:*:*:*:*:*:*:* |
CVE-2024-40766 | 9.8 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.09998 | An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS ... | 2024-08-23 | CISA | cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*;cpe:2... |
CVE-2024-40890 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.24077 | **UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST re... | 2025-02-04 | CISA | cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*;cpe:2... |
CVE-2024-40891 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.43473 | **UNSUPPORTED WHEN ASSIGNED**
A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet. | 2025-02-04 | CISA | cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*;cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*;cpe:2... |
CVE-2024-41107 | 8.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.92901 | The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and ... | 2024-07-19 | Nuclei | cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:* |
CVE-2024-41628 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 0.84574 | Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API. | 2024-07-26 | Nuclei | null |
CVE-2024-41667 | 8.8 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.55215 | OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default ... | 2024-07-24 | Nuclei | null |
CVE-2024-41710 | 7.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 0.19683 | A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot ... | 2024-08-12 | CISA | cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:*;cpe:2.3:h:mitel:6915_sip:-:*... |
CVE-2024-41713 | 9.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N | 0.93572 | A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrup... | 2024-10-21 | Nuclei/CISA | cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:* |
CVE-2024-41810 | 6.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 0.62288 | Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redi... | 2024-07-29 | Nuclei | cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:* |
CVE-2024-41955 | 5.2 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N | 0.11321 | Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5. | 2024-07-31 | Nuclei | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* |
CVE-2024-42009 | 9.3 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N | 0.88575 | A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php. | 2024-08-05 | CISA | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* |
CVE-2024-42365 | 7.4 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L | 0.34237 | Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because ... | 2024-08-08 | Metasploit | cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*;cpe:2.3:a:asterisk:certified_as... |
CVE-2024-4257 | 6.3 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L | 0.9154 | A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/deleteStudy.php. The manipulation of the argument documentUniqueId leads to sql injection. It is possible to initiate the attack remotely. The exploit has bee... | 2024-04-27 | Nuclei | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.