CVE
stringlengths
13
16
CVSS Score
float64
0
10
CVSS_Vector
stringclasses
257 values
EPSS
float64
0
0.95
Description
stringlengths
28
3.79k
Published
stringdate
1990-08-14 00:00:00
2025-10-05 00:00:00
Source
stringclasses
7 values
CPE
stringlengths
33
51k
CVE-2024-51567
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.94261
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
2024-10-29
Metasploit/Nuclei/CISA
cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*
CVE-2024-51568
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.92968
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
2024-10-29
Metasploit/Nuclei
cpe:2.3:a:cyberpanel:cyberpanel:*:*:*:*:*:*:*:*
CVE-2024-51739
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.46896
Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the user exists or not. This fix is included in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. Users unable to upgrade may overload the dictionary entry `"UI:ResetPwd-Error-WrongLogin"` through an extension and replace it with a generic message.
2024-11-05
Nuclei
cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*
CVE-2024-51977
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.48996
An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.
2025-06-25
Metasploit/Nuclei
null
CVE-2024-51978
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.61881
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
2025-06-25
Metasploit/Nuclei
null
CVE-2024-5217
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94155
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
2024-07-10
Nuclei/CISA
cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_1_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_3_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_7b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*;cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*
CVE-2024-5230
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.29187
A vulnerability has been found in EnvaySoft FleetCart up to 4.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument razorpayKeyId leads to information disclosure. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-265981 was assigned to this vulnerability.
2024-05-23
Nuclei
null
CVE-2024-52433
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.78197
Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free allows Object Injection.This issue affects My Geo Posts Free: from n/a through 1.2.
2024-11-18
Nuclei
cpe:2.3:a:mindstien:my_geo_posts_free:*:*:*:*:*:wordpress:*:*
CVE-2024-5274
9.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
0.0269
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
2024-05-28
CISA
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*;cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
CVE-2024-5276
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.8478
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
2024-06-25
Metasploit/Nuclei
cpe:2.3:a:fortra:filecatalyst_workflow:*:*:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:-:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build112:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build114:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build126:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build130:*:*:*:*:*:*;cpe:2.3:a:fortra:filecatalyst_workflow:5.1.6:build135:*:*:*:*:*:*
CVE-2024-52762
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.00342
A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter.
2024-11-19
Nuclei
cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
CVE-2024-52763
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.00262
A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.
2024-11-19
Nuclei
cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
CVE-2024-52875
8.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.86613
An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The dest GET parameter passed to the /nonauth/addCertException.cs and /nonauth/guestConfirm.cs and /nonauth/expiration.cs pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
2025-01-31
Nuclei
cpe:2.3:a:gfi:kerio_control:*:*:*:*:*:*:*:*
CVE-2024-53104
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.02093
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.
2024-12-02
CISA
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2024-5315
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.48513
Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters viewstatut in /dolibarr/commande/list.php.
2024-05-24
Nuclei
cpe:2.3:a:dolibarr:dolibarr_erp\/crm:9.0.1:*:*:*:*:*:*:*
CVE-2024-53150
7.1
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
0.00178
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check.
2024-12-24
CISA
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2024-53197
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0032
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.
2024-12-27
CISA
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVE-2024-5334
0
null
0.5433
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
2024-06-27
Nuclei
cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
CVE-2024-53704
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93819
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
2025-01-09
Nuclei/CISA
cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*;cpe:2.3:h:sonicwall:tz80:-:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:7.1.2-7019:*:*:*:*:*:*:*;cpe:2.3:o:sonicwall:sonicos:8.0.0-8035:*:*:*:*:*:*:*
CVE-2024-53991
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.33562
Discourse is an open source platform for community discussion. This vulnerability only impacts Discourse instances configured to use `FileStore::LocalStore` which means uploads and backups are stored locally on disk. If an attacker knows the name of the Discourse backup file, the attacker can trick nginx into sending the Discourse backup file with a well crafted request. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. Users unable to upgrade can either 1. Download all local backups on to another storage device, disable the `enable_backups` site setting and delete all backups until the site has been upgraded to pull in the fix. Or 2. Change the `backup_location` site setting to `s3` so that backups are stored and downloaded directly from S3.
2024-12-19
Nuclei
cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta2:*:*:beta:*:*:*;cpe:2.3:a:discourse:discourse:3.4.0:beta3:*:*:beta:*:*:*
CVE-2024-54085
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.21093
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
2025-03-11
CISA
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*;cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*;cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
CVE-2024-5420
0
null
0.33185
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
2024-06-04
Nuclei
null
CVE-2024-5421
0
null
0.15671
Missing input validation and OS command integration of the input in the utnserver Pro, utnserver ProMAX, INU-100 web-interface allows authenticated command injection.This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
2024-06-04
Nuclei
null
CVE-2024-54330
7.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
0.56017
Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
2024-12-13
Nuclei
null
CVE-2024-54385
7.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
0.8609
Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player allows Server Side Request Forgery.This issue affects Radio Player: from n/a through 2.0.82.
2024-12-16
Nuclei
null
CVE-2024-54763
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.02417
An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
2025-01-06
Nuclei
null
CVE-2024-54764
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.04067
An access control issue in the component /login/hostinfo2.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
2025-01-06
Nuclei
null
CVE-2024-54767
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.0401
An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication. NOTE: this is disputed by the Supplier because it cannot be reproduced, and the issue report focuses on an unintended configuration with direct Internet exposure.
2025-01-06
Nuclei
null
CVE-2024-5488
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.72733
The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
2024-07-09
Nuclei
cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*
CVE-2024-55218
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.00269
IceWarp Server 10.2.1 is vulnerable to Cross Site Scripting (XSS) via the meta parameter.
2025-01-07
Nuclei
cpe:2.3:a:icewarp:icewarp:10.2.1:*:*:*:*:*:*:*
CVE-2024-5522
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.7326
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
2024-06-20
Nuclei
cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:*:wordpress:*:*
CVE-2024-55415
5.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
0.36555
DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.
2025-01-30
Nuclei
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
CVE-2024-55416
3.5
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N
0.00294
DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via /admin/compass. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed.
2025-01-30
Nuclei
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
CVE-2024-55417
4.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
0.05656
DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server.
2025-01-30
Nuclei
cpe:2.3:a:thecontrolgroup:voyager:*:*:*:*:*:laravel:*:*
CVE-2024-55457
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.78319
MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information.
2025-02-20
Nuclei
null
CVE-2024-55550
2.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
0.15002
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
2024-12-10
Nuclei/CISA
cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*;cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:*;cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:*
CVE-2024-55555
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.29729
Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function.
2025-01-07
Metasploit
null
CVE-2024-55556
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.7976
A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel's secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data. By altering this data and re-encrypting it with the APP_KEY, the attacker could trigger arbitrary deserialization on the server, potentially leading to remote command execution (RCE). The vulnerability is primarily exploited by accessing an exposed cookie and manipulating it using the secret key to gain malicious access to the server.
2025-01-07
Metasploit
null
CVE-2024-55591
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94177
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
2025-01-14
Nuclei/CISA
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*;cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
CVE-2024-55956
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.91828
In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
2024-12-13
Metasploit/Nuclei/CISA
cpe:2.3:a:cleo:harmony:*:*:*:*:*:*:*:*;cpe:2.3:a:cleo:lexicom:*:*:*:*:*:*:*:*;cpe:2.3:a:cleo:vltrader:*:*:*:*:*:*:*:*
CVE-2024-55964
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.39997
An issue was discovered in Appsmith before 1.52. An incorrectly configured PostgreSQL instance in the Appsmith image leads to remote command execution inside the Appsmith Docker container. The attacker must be able to access Appsmith, login to it, create a datasource, create a query against that datasource, and execute that query.
2025-03-26
Metasploit
cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*
CVE-2024-56145
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93747
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue.
2024-12-18
Metasploit/Nuclei/CISA
cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
CVE-2024-56325
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.10166
Authentication Bypass Issue If the path does not contain / and contain., authentication is not required. Expected Normal Request and Response Example curl -X POST -H "Content-Type: application/json" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"} http://{server_ip}:9000/users Return: {"code":401,"error":"HTTP 401 Unauthorized"} Malicious Request and Response Example curl -X POST -H "Content-Type: application/json" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}' http://{serverip}:9000/users; http://{serverip}:9000/users; . Return: {"users":{}} A new user gets added bypassing authentication, enabling the user to control Pinot.
2025-04-01
Nuclei
cpe:2.3:a:apache:pinot:*:*:*:*:*:*:*:*
CVE-2024-56512
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
0.27782
Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups. Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group. Creating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized. This vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation.
2024-12-28
Nuclei
cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*
CVE-2024-57045
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.45484
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
2025-02-18
Nuclei
cpe:2.3:h:dlink:dir-859_a3:-:*:*:*:*:*:*:*;cpe:2.3:o:dlink:dir-859_a3_firmware:*:*:*:*:*:*:*:*
CVE-2024-57046
8.8
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.58474
A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested url, it will be recognized as passing the authentication.
2025-02-18
Nuclei
cpe:2.3:h:netgear:dgn2200:-:*:*:*:*:*:*:*;cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*
CVE-2024-57049
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.42219
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
2025-02-18
Nuclei
cpe:2.3:h:tp-link:archer_c20:6.6:*:*:*:*:*:*:*;cpe:2.3:o:tp-link:archer_c20_firmware:6.6_230412:*:*:*:*:*:*:*
CVE-2024-57487
6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
0.35372
In Code-Projects Online Car Rental System 1.0, the file upload feature does not validate file extensions or MIME types allowing an attacker to upload a PHP shell without any restrictions and execute commands on the server.
2025-01-13
Metasploit
cpe:2.3:a:code-projects:online_car_rental_system:1.0:*:*:*:*:*:*:*
CVE-2024-57514
4.8
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.09189
The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.
2025-01-28
Nuclei
null
CVE-2024-5765
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.77175
The WpStickyBar WordPress plugin through 2.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
2024-07-30
Nuclei
cpe:2.3:a:a17lab:wpstickybar:*:*:*:*:*:wordpress:*:*
CVE-2024-57727
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.93917
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
2025-01-15
Metasploit/Nuclei/CISA
cpe:2.3:a:simple-help:simplehelp:*:*:*:*:*:*:*:*
CVE-2024-57968
9.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
0.15499
Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this.
2025-02-03
CISA
cpe:2.3:a:advantive:veracore:*:*:*:*:*:*:*:*
CVE-2024-5806
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.89937
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
2024-06-25
Metasploit
cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*;cpe:2.3:a:progress:moveit_transfer:2024.0.0:*:*:*:*:*:*:*
CVE-2024-58136
9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
0.83062
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
2025-04-10
Nuclei/CISA
cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*
CVE-2024-5827
0
null
0.34903
Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors.
2024-06-28
Nuclei
null
CVE-2024-5910
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.90966
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
2024-07-10
Metasploit/Nuclei/CISA
cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:*
CVE-2024-5932
10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
0.94126
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
2024-08-20
Metasploit/Nuclei
cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*
CVE-2024-5936
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.00647
An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
2024-06-27
Nuclei
cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:*
CVE-2024-5947
6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.83306
Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
2024-06-13
Nuclei
cpe:2.3:h:deepseaelectronics:dse855:-:*:*:*:*:*:*:*;cpe:2.3:o:deepseaelectronics:dse855_firmware:1.1.0:*:*:*:*:*:*:*
CVE-2024-5975
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.28582
The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
2024-07-30
Nuclei
cpe:2.3:a:contrive:cz_loan_management:*:*:*:*:*:wordpress:*:*
CVE-2024-6028
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.82996
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
2024-06-25
Nuclei
null
CVE-2024-6047
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.7488
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
2024-06-17
CISA
cpe:2.3:h:geovision:gv-dsp_lpr:2.0:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv-vs14_vs14:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_gm8186_vs14:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_bx130:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_bx1500:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_cb220:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_ebl1100:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_efd1100:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fd2410:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fd3400:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fe3401:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_ipcamd_gv_fe420:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs03:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs04a:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs04h:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs216xx:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gv_vs2410:-:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gvlx_4:2.0:*:*:*:*:*:*:*;cpe:2.3:h:geovision:gvlx_4:3.0:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv-dsp_lpr_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv-vs14_vs14_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_gm8186_vs14_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_bx130_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_bx1500_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_cb220_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_ebl1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_efd1100_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fd2410_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fd3400_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fe3401_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_ipcamd_gv_fe420_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs03_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs04a_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs04h_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs216xx_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs2410_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gv_vs28xx_firmware:-:*:*:*:*:*:*:*;cpe:2.3:o:geovision:gvlx_4_firmware:-:*:*:*:*:*:*:*
CVE-2024-6049
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.74231
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
2024-10-24
Nuclei
null
CVE-2024-6095
5.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
0.8745
A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17.
2024-07-06
Nuclei
cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*
CVE-2024-6127
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.64373
BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
2024-06-27
Metasploit
null
CVE-2024-6159
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.08598
The Push Notification for Post and BuddyPress WordPress plugin before 1.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
2025-05-15
Nuclei
cpe:2.3:a:pnfpb:push_notification_for_post_and_buddypress:*:*:*:*:*:wordpress:*:*
CVE-2024-6188
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.29559
A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
2024-06-20
Nuclei
null
CVE-2024-6205
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.89055
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
2024-07-19
Nuclei
cpe:2.3:a:payplus:payplus_payment_gateway:*:*:*:*:*:wordpress:*:*
CVE-2024-6235
8.8
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.86785
Sensitive information disclosure in NetScaler Console
2024-07-10
Nuclei
cpe:2.3:a:citrix:netscaler_console:*:*:*:*:*:*:*:*
CVE-2024-6289
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.02185
The WPS Hide Login WordPress plugin before 1.9.16.4 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
2024-07-15
Nuclei
cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*
CVE-2024-6366
9.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
0.90912
The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP.
2024-07-29
Nuclei
cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*
CVE-2024-6396
0
null
0.90499
A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
2024-07-12
Nuclei
cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:python:*:*
CVE-2024-6420
8.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
0.23954
The Hide My WP Ghost WordPress plugin before 5.2.02 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
2024-07-23
Nuclei
cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*
CVE-2024-6460
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.90307
The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
2024-08-16
Nuclei
cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:wordpress:*:*
CVE-2024-6517
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.01349
The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.
2024-09-26
Nuclei
cpe:2.3:a:dotsquares:contact_form_7_math_captcha:*:*:*:*:*:wordpress:*:*
CVE-2024-6586
7.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
0.13768
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
2024-08-30
Nuclei
null
CVE-2024-6587
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.78069
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
2024-09-13
Nuclei
cpe:2.3:a:litellm:litellm:1.38.10:*:*:*:*:*:*:*
CVE-2024-6646
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.92637
A vulnerability was found in Netgear WN604 up to 20240710. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /downloadFile.php of the component Web Interface. The manipulation of the argument file with the input config leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
2024-07-10
Nuclei
null
CVE-2024-6651
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.09718
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
2024-08-06
Nuclei
cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
CVE-2024-6670
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.94465
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.
2024-08-29
Metasploit/Nuclei/CISA
cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
CVE-2024-6746
4.3
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.77088
A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".
2024-07-15
Nuclei
cpe:2.3:a:easyspider:easyspider:0.6.2:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CVE-2024-6781
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.93406
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
2024-08-06
Nuclei
cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
CVE-2024-6782
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.93799
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
2024-08-06
Metasploit/Nuclei
null
CVE-2024-6842
0
null
0.31303
In version 1.5.5 of mintplex-labs/anything-llm, the `/setup-complete` API endpoint allows unauthorized users to access sensitive system settings. The data returned by the `currentSettings` function includes sensitive information such as API keys for search engines, which can be exploited by attackers to steal these keys and cause loss of user assets.
2025-03-20
Nuclei
cpe:2.3:a:mintplexlabs:anythingllm:1.5.5:*:*:*:*:*:*:*
CVE-2024-6845
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.04282
The Chatbot with ChatGPT WordPress plugin before 2.4.6 does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key
2024-09-25
Nuclei
cpe:2.3:a:smartsearchwp:smartsearchwp:*:*:*:*:*:wordpress:*:*
CVE-2024-6846
5.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
0.01492
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not validate access on some REST routes, allowing for an unauthenticated user to purge error and chat logs
2024-09-05
Nuclei
cpe:2.3:a:webdigit:chatbot_with_chatgpt:*:*:*:*:*:wordpress:*:*
CVE-2024-6886
0
null
0.10369
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gitea Gitea Open Source Git Server allows Stored XSS.This issue affects Gitea Open Source Git Server: 1.22.0.
2024-08-06
Nuclei
null
CVE-2024-6892
6.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.03407
Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.
2024-08-08
Nuclei
cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*
CVE-2024-6893
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.92036
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
2024-08-08
Nuclei
cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*
CVE-2024-6911
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.93588
Files on the Windows system are accessible without authentication to external parties due to a local file inclusion in PerkinElmer ProcessPlus.This issue affects ProcessPlus: through 1.11.6507.0.
2024-07-22
Nuclei
cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*
CVE-2024-6922
0
null
0.35695
Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component. An attacker with unauthenticated access to the Automation 360 Control Room HTTPS service (port 443) or HTTP service (port 80) can trigger arbitrary web requests from the server.
2024-07-26
Nuclei
null
CVE-2024-6924
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.74627
The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
2024-09-08
Nuclei
cpe:2.3:a:themetechmount:truebooker:*:*:*:*:*:wordpress:*:*
CVE-2024-6926
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.68752
The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
2024-09-04
Nuclei
cpe:2.3:a:wow-company:viral_signup:*:*:*:*:*:wordpress:*:*
CVE-2024-6928
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.74627
The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
2024-09-08
Nuclei
cpe:2.3:a:opti.marketing:opti_marketing:*:*:*:*:*:wordpress:*:*
CVE-2024-7008
5.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
0.09565
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
2024-08-06
Nuclei
cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
CVE-2024-7029
8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.92754
Commands can be injected over the network and executed without authentication.
2024-08-02
Nuclei
cpe:2.3:h:avtech:avm1203:-:*:*:*:*:*:*:*;cpe:2.3:o:avtech:avm1203_firmware:*:*:*:*:*:*:*:*
CVE-2024-7097
4.3
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
0.0871
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization. Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.
2025-05-30
Nuclei
cpe:2.3:a:wso2:api_manager:2.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:3.2.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.1.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.2.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:api_manager:4.3.0:-:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.11.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.2.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.4.1:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.8.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:5.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:6.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:6.1.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server:7.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.10.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.5.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.6.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.7.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:identity_server_as_key_manager:5.9.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_am:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_iam:2.0.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.3.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.4.0:*:*:*:*:*:*:*;cpe:2.3:a:wso2:open_banking_km:1.5.0:*:*:*:*:*:*:*
CVE-2024-7120
6.3
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
0.92163
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
2024-07-26
Nuclei
cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*;cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*;cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*
CVE-2024-7188
7.3
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
0.82082
A vulnerability was found in Bylancer Quicklancer 2.4. It has been rated as critical. This issue affects some unknown processing of the file /listing of the component GET Parameter Handler. The manipulation of the argument range2 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272609 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
2024-07-29
Nuclei
cpe:2.3:a:bylancer:quicklancer:2.4:*:*:*:*:*:*:*
CVE-2024-7262
7.8
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.28632
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
2024-08-15
CISA
cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:*;cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*