CVE
stringlengths 13
16
| CVSS Score
float64 0
10
| CVSS_Vector
stringclasses 257
values | EPSS
float64 0
0.95
| Description
stringlengths 28
3.79k
| Published
stringdate 1990-08-14 00:00:00
2025-10-05 00:00:00
| Source
stringclasses 7
values | CPE
stringlengths 33
51k
⌀ |
|---|---|---|---|---|---|---|---|
CVE-2024-51567
| 10
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
| 0.94261
|
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
|
2024-10-29
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*
|
CVE-2024-51568
| 10
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
| 0.92968
|
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
|
2024-10-29
|
Metasploit/Nuclei
|
cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*
|
CVE-2024-51739
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.46896
|
Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the user exists or not. This fix is included in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. Users unable to upgrade may overload the dictionary entry `"UI:ResetPwd-Error-WrongLogin"` through an extension and replace it with a generic message.
|
2024-11-05
|
Nuclei
|
cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*
|
CVE-2024-51977
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.48996
|
An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.
|
2025-06-25
|
Metasploit/Nuclei
| null |
CVE-2024-51978
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.61881
|
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
|
2025-06-25
|
Metasploit/Nuclei
| null |
CVE-2024-5217
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.94155
|
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
|
2024-07-10
|
Nuclei/CISA
|
cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*
|
CVE-2024-5230
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.29187
|
A vulnerability has been found in EnvaySoft FleetCart up to 4.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument razorpayKeyId leads to information disclosure. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-265981 was assigned to this vulnerability.
|
2024-05-23
|
Nuclei
| null |
CVE-2024-52433
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.78197
|
Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2.
|
2024-11-18
|
Nuclei
|
cpe:2.3:a:mindstien:my_geo_posts_free:*:*:*:*:*:wordpress:*:*
|
CVE-2024-5274
| 9.6
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
| 0.0269
|
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
|
2024-05-28
|
CISA
|
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
|
CVE-2024-5276
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.8478
|
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
|
2024-06-25
|
Metasploit/Nuclei
|
cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:-:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build114:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build126:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build130:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build135:*:*:*:*:*:*
|
CVE-2024-52762
| 5.4
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| 0.00342
|
A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter.
|
2024-11-19
|
Nuclei
|
cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
|
CVE-2024-52763
| 5.4
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| 0.00262
|
A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.
|
2024-11-19
|
Nuclei
|
cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
|
CVE-2024-52875
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.86613
|
An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
|
2025-01-31
|
Nuclei
|
cpe:2.3:a:gfi:kerio_control:*:*:*:*:*:*:*:*
|
CVE-2024-53104
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.02093
|
In the Linux kernel, the following vulnerability has been resolved:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
|
2024-12-02
|
CISA
|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
|
CVE-2024-5315
| 9.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| 0.48513
|
Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters
viewstatut in /dolibarr/commande/list.php.
|
2024-05-24
|
Nuclei
|
cpe:2.3:a:dolibarr:dolibarr_erp\/crm:9.0.1:*:*:*:*:*:*:*
|
CVE-2024-53150
| 7.1
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
| 0.00178
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix out of bounds reads when finding clock sources
The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors. That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.
For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal. When the descriptor
length is shorter than expected, it's skipped in the loop.
For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
|
2024-12-24
|
CISA
|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
|
CVE-2024-53197
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.0032
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev->config.
This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
|
2024-12-27
|
CISA
|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
|
CVE-2024-5334
| 0
| null | 0.5433
|
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
|
2024-06-27
|
Nuclei
|
cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
|
CVE-2024-53704
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.93819
|
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
|
2025-01-09
|
Nuclei/CISA
|
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:7.1.2-7019:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:8.0.0-8035:*:*:*:*:*:*:*
|
CVE-2024-53991
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.33562
|
Discourse is an open source platform for community discussion. This vulnerability only impacts Discourse instances configured to use `FileStore::LocalStore` which means uploads and backups are stored locally on disk. If an attacker knows the name of the Discourse backup file, the attacker can trick nginx into sending the Discourse backup file with a well crafted request. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade can either 1. Download all local backups on to another storage device, disable the `enable_backups` site setting and delete all backups until the site has been upgraded to pull in the fix. Or 2. Change the `backup_location` site setting to `s3` so that backups are stored and downloaded directly from S3.
|
2024-12-19
|
Nuclei
|
cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta2:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta3:*:*:beta:*:*:*
|
CVE-2024-54085
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.21093
|
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
|
2025-03-11
|
CISA
|
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*;cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
|
CVE-2024-5420
| 0
| null | 0.33185
|
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
|
2024-06-04
|
Nuclei
| null |
CVE-2024-5421
| 0
| null | 0.15671
|
Missing input validation and OS command integration of the input in the utnserver Pro, utnserver ProMAX, INU-100 web-interface allows authenticated command injection.This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
|
2024-06-04
|
Nuclei
| null |
CVE-2024-54330
| 7.2
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
| 0.56017
|
Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
|
2024-12-13
|
Nuclei
| null |
CVE-2024-54385
| 7.2
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
| 0.8609
|
Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through 2.0.82.
|
2024-12-16
|
Nuclei
| null |
CVE-2024-54763
| 6.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| 0.02417
|
An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
|
2025-01-06
|
Nuclei
| null |
CVE-2024-54764
| 6.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| 0.04067
|
An access control issue in the component /login/hostinfo2.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
|
2025-01-06
|
Nuclei
| null |
CVE-2024-54767
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.0401
|
An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication. NOTE: this is disputed by the Supplier because it cannot be reproduced, and the issue report focuses on an unintended configuration with direct Internet exposure.
|
2025-01-06
|
Nuclei
| null |
CVE-2024-5488
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.72733
|
The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
|
2024-07-09
|
Nuclei
|
cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*
|
CVE-2024-55218
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.00269
|
IceWarp Server 10.2.1 is vulnerable to Cross Site Scripting (XSS) via the meta parameter.
|
2025-01-07
|
Nuclei
|
cpe:2.3:a:icewarp:icewarp:10.2.1:*:*:*:*:*:*:*
|
CVE-2024-5522
| 6.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| 0.7326
|
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
|
2024-06-20
|
Nuclei
|
cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:*:wordpress:*:*
|
CVE-2024-55415
| 5.7
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
| 0.36555
|
DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.
|
2025-01-30
|
Nuclei
|
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
|
CVE-2024-55416
| 3.5
|
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N
| 0.00294
|
DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via /admin/compass. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed.
|
2025-01-30
|
Nuclei
|
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
|
CVE-2024-55417
| 4.3
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| 0.05656
|
DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server.
|
2025-01-30
|
Nuclei
|
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
|
CVE-2024-55457
| 6.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| 0.78319
|
MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information.
|
2025-02-20
|
Nuclei
| null |
CVE-2024-55550
| 2.7
|
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
| 0.15002
|
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
|
2024-12-10
|
Nuclei/CISA
|
cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*;cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:*;cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:*
|
CVE-2024-55555
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.29729
|
Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function.
|
2025-01-07
|
Metasploit
| null |
CVE-2024-55556
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.7976
|
A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server.
|
2025-01-07
|
Metasploit
| null |
CVE-2024-55591
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.94177
|
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
|
2025-01-14
|
Nuclei/CISA
|
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
|
CVE-2024-55956
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.91828
|
In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
|
2024-12-13
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:cleo:harmony:*:*:*:*:*:*:*:*;cpe:2.3:a:cleo:lexicom:*:*:*:*:*:*:*:*;cpe:2.3:a:cleo:vltrader:*:*:*:*:*:*:*:*
|
CVE-2024-55964
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.39997
|
An issue was discovered in Appsmith before 1.52. An incorrectly configured PostgreSQL instance in the Appsmith image leads to remote command execution inside the Appsmith Docker container. The attacker must be able to access Appsmith, login to it, create a datasource, create a query against that datasource, and execute that query.
|
2025-03-26
|
Metasploit
|
cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*
|
CVE-2024-56145
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.93747
|
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
|
2024-12-18
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
|
CVE-2024-56325
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.10166
|
Authentication Bypass Issue
If the path does not contain / and contain., authentication is not required.
Expected Normal Request and Response Example
curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users
Return: {"code":401,"error":"HTTP 401 Unauthorized"}
Malicious Request and Response Example
curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; .
Return: {"users":{}}
A new user gets added bypassing authentication, enabling the user to control Pinot.
|
2025-04-01
|
Nuclei
|
cpe:2.3:a:apache:pinot:*:*:*:*:*:*:*:*
|
CVE-2024-56512
| 5.4
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
| 0.27782
|
Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups.
Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group.
Creating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized.
This vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation.
|
2024-12-28
|
Nuclei
|
cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*
|
CVE-2024-57045
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.45484
|
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
|
2025-02-18
|
Nuclei
|
cpe:2.3:h:dlink:dir-859_a3:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_a3_firmware:*:*:*:*:*:*:*:*
|
CVE-2024-57046
| 8.8
|
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.58474
|
A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested url, it will be recognized as passing the authentication.
|
2025-02-18
|
Nuclei
|
cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*
|
CVE-2024-57049
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.42219
|
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
|
2025-02-18
|
Nuclei
|
cpe:2.3:h:tp-link:archer_c20:6.6:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c20_firmware:6.6_230412:*:*:*:*:*:*:*
|
CVE-2024-57487
| 6.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
| 0.35372
|
In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server.
|
2025-01-13
|
Metasploit
|
cpe:2.3:a:code-projects:online_car_rental_system:1.0:*:*:*:*:*:*:*
|
CVE-2024-57514
| 4.8
|
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| 0.09189
|
The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.
|
2025-01-28
|
Nuclei
| null |
CVE-2024-5765
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.77175
|
The WpStickyBar WordPress plugin through 2.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
2024-07-30
|
Nuclei
|
cpe:2.3:a:a17lab:wpstickybar:*:*:*:*:*:wordpress:*:*
|
CVE-2024-57727
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.93917
|
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
|
2025-01-15
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:simple-help:simplehelp:*:*:*:*:*:*:*:*
|
CVE-2024-57968
| 9.9
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
| 0.15499
|
Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this.
|
2025-02-03
|
CISA
|
cpe:2.3:a:advantive:veracore:*:*:*:*:*:*:*:*
|
CVE-2024-5806
| 9.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| 0.89937
|
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
|
2024-06-25
|
Metasploit
|
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*;cpe:2.3:a:progress:moveit_transfer:2024.0.0:*:*:*:*:*:*:*
|
CVE-2024-58136
| 9
|
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
| 0.83062
|
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
|
2025-04-10
|
Nuclei/CISA
|
cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*
|
CVE-2024-5827
| 0
| null | 0.34903
|
Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors.
|
2024-06-28
|
Nuclei
| null |
CVE-2024-5910
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.90966
|
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.
Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
|
2024-07-10
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:*
|
CVE-2024-5932
| 10
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
| 0.94126
|
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
|
2024-08-20
|
Metasploit/Nuclei
|
cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*
|
CVE-2024-5936
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.00647
|
An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
|
2024-06-27
|
Nuclei
|
cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:*
|
CVE-2024-5947
| 6.5
|
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.83306
|
Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
|
2024-06-13
|
Nuclei
|
cpe:2.3:h:deepseaelectronics:dse855:-:*:*:*:*:*:*:*;cpe:2.3:o:deepseaelectronics:dse855_firmware:1.1.0:*:*:*:*:*:*:*
|
CVE-2024-5975
| 9.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| 0.28582
|
The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
2024-07-30
|
Nuclei
|
cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6028
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.82996
|
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
2024-06-25
|
Nuclei
| null |
CVE-2024-6047
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.7488
|
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
|
2024-06-17
|
CISA
|
cpe:2.3:h:geovision:gv-dsp_lpr:2.0:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv-vs14_vs14:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_gm8186_vs14:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_bx130:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_bx1500:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_cb220:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_ebl1100:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_efd1100:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fd2410:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fd3400:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fe3401:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fe420:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs03:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs04a:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs04h:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs216xx:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs2410:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gvlx_4:2.0:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gvlx_4:3.0:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv-dsp_lpr_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv-vs14_vs14_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_gm8186_vs14_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_bx130_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_bx1500_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_cb220_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_ebl1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_efd1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fd2410_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fd3400_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fe3401_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fe420_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs03_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs04a_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs04h_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs216xx_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs2410_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs28xx_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gvlx_4_firmware:-:*:*:*:*:*:*:*
|
CVE-2024-6049
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.74231
|
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
|
2024-10-24
|
Nuclei
| null |
CVE-2024-6095
| 5.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
| 0.8745
|
A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17.
|
2024-07-06
|
Nuclei
|
cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*
|
CVE-2024-6127
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.64373
|
BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
|
2024-06-27
|
Metasploit
| null |
CVE-2024-6159
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.08598
|
The Push Notification for Post and BuddyPress WordPress plugin before 1.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
2025-05-15
|
Nuclei
|
cpe:2.3:a:pnfpb:push_notification_for_post_and_buddypress:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6188
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.29559
|
A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
2024-06-20
|
Nuclei
| null |
CVE-2024-6205
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.89055
|
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
|
2024-07-19
|
Nuclei
|
cpe:2.3:a:payplus:payplus_payment_gateway:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6235
| 8.8
|
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.86785
|
Sensitive information disclosure in NetScaler Console
|
2024-07-10
|
Nuclei
|
cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*
|
CVE-2024-6289
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.02185
|
The WPS Hide Login WordPress plugin before 1.9.16.4 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
|
2024-07-15
|
Nuclei
|
cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6366
| 9.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
| 0.90912
|
The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP.
|
2024-07-29
|
Nuclei
|
cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6396
| 0
| null | 0.90499
|
A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
|
2024-07-12
|
Nuclei
|
cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:python:*:*
|
CVE-2024-6420
| 8.6
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
| 0.23954
|
The Hide My WP Ghost WordPress plugin before 5.2.02 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
|
2024-07-23
|
Nuclei
|
cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6460
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.90307
|
The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
|
2024-08-16
|
Nuclei
|
cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6517
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.01349
|
The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.
|
2024-09-26
|
Nuclei
|
cpe:2.3:a:dotsquares:contact_form_7_math_captcha:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6586
| 7.3
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
| 0.13768
|
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
|
2024-08-30
|
Nuclei
| null |
CVE-2024-6587
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.78069
|
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
|
2024-09-13
|
Nuclei
|
cpe:2.3:a:litellm:litellm:1.38.10:*:*:*:*:*:*:*
|
CVE-2024-6646
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.92637
|
A vulnerability was found in Netgear WN604 up to 20240710. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /downloadFile.php of the component Web Interface. The manipulation of the argument file with the input config leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
2024-07-10
|
Nuclei
| null |
CVE-2024-6651
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.09718
|
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
2024-08-06
|
Nuclei
|
cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6670
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.94465
|
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.
|
2024-08-29
|
Metasploit/Nuclei/CISA
|
cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
|
CVE-2024-6746
| 4.3
|
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.77088
|
A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".
|
2024-07-15
|
Nuclei
|
cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
CVE-2024-6781
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.93406
|
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
|
2024-08-06
|
Nuclei
|
cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
|
CVE-2024-6782
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.93799
|
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
|
2024-08-06
|
Metasploit/Nuclei
| null |
CVE-2024-6842
| 0
| null | 0.31303
|
In version 1.5.5 of mintplex-labs/anything-llm, the `/setup-complete` API endpoint allows unauthorized users to access sensitive system settings. The data returned by the `currentSettings` function includes sensitive information such as API keys for search engines, which can be exploited by attackers to steal these keys and cause loss of user assets.
|
2025-03-20
|
Nuclei
|
cpe:2.3:a:mintplexlabs:anythingllm:1.5.5:*:*:*:*:*:*:*
|
CVE-2024-6845
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| 0.04282
|
The Chatbot with ChatGPT WordPress plugin before 2.4.6 does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key
|
2024-09-25
|
Nuclei
|
cpe:2.3:a:smartsearchwp:smartsearchwp:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6846
| 5.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
| 0.01492
|
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not validate access on some REST routes, allowing for an unauthenticated user to purge error and chat logs
|
2024-09-05
|
Nuclei
|
cpe:2.3:a:webdigit:chatbot_with_chatgpt:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6886
| 0
| null | 0.10369
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gitea Gitea Open Source Git Server allows Stored XSS.This issue affects Gitea Open Source Git Server: 1.22.0.
|
2024-08-06
|
Nuclei
| null |
CVE-2024-6892
| 6.1
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| 0.03407
|
Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.
|
2024-08-08
|
Nuclei
|
cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*
|
CVE-2024-6893
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.92036
|
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
|
2024-08-08
|
Nuclei
|
cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*
|
CVE-2024-6911
| 7.5
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| 0.93588
|
Files on the Windows system are accessible without authentication to external parties due to a local file inclusion in PerkinElmer ProcessPlus.This issue affects ProcessPlus: through 1.11.6507.0.
|
2024-07-22
|
Nuclei
|
cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*
|
CVE-2024-6922
| 0
| null | 0.35695
|
Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component. An attacker with unauthenticated access to the Automation 360 Control Room HTTPS service (port 443) or HTTP service (port 80) can trigger arbitrary web requests from the server.
|
2024-07-26
|
Nuclei
| null |
CVE-2024-6924
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.74627
|
The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
2024-09-08
|
Nuclei
|
cpe:2.3:a:themetechmount:truebooker:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6926
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.68752
|
The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
2024-09-04
|
Nuclei
|
cpe:2.3:a:wow-company:viral_signup:*:*:*:*:*:wordpress:*:*
|
CVE-2024-6928
| 9.8
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| 0.74627
|
The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
2024-09-08
|
Nuclei
|
cpe:2.3:a:opti.marketing:opti_marketing:*:*:*:*:*:wordpress:*:*
|
CVE-2024-7008
| 5.4
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
| 0.09565
|
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
|
2024-08-06
|
Nuclei
|
cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
|
CVE-2024-7029
| 8.8
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| 0.92754
|
Commands can be injected over the network and executed without authentication.
|
2024-08-02
|
Nuclei
|
cpe:2.3:h:avtech:avm1203:-:*:*:*:*:*:*:*;cpe:2.3:o:avtech:avm1203_firmware:*:*:*:*:*:*:*:*
|
CVE-2024-7097
| 4.3
|
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
| 0.0871
|
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization.
Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.
|
2025-05-30
|
Nuclei
|
cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_am:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_iam:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.5.0:*:*:*:*:*:*:*
|
CVE-2024-7120
| 6.3
|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
| 0.92163
|
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
|
2024-07-26
|
Nuclei
|
cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*
|
CVE-2024-7188
| 7.3
|
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
| 0.82082
|
A vulnerability was found in Bylancer Quicklancer 2.4. It has been rated as critical. This issue affects some unknown processing of the file /listing of the component GET Parameter Handler. The manipulation of the argument range2 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272609 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
2024-07-29
|
Nuclei
|
cpe:2.3:a:bylancer:quicklancer:2.4:*:*:*:*:*:*:*
|
CVE-2024-7262
| 7.8
|
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| 0.28632
|
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.
The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
|
2024-08-15
|
CISA
|
cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.