Search Results (Refine Search)
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2024-27899 |
Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability. Published: April 08, 2024; 9:15:48 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-27898 |
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality. Published: April 08, 2024; 9:15:48 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-25646 |
Due to improper validation, SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application. Published: April 08, 2024; 9:15:48 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-31047 |
An issue in Academy Software Foundation openexr v.3.2.3 and before allows a local attacker to cause a denial of service (DoS) via the convert function of exrmultipart.cpp. Published: April 08, 2024; 7:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-23584 |
The NMAP Importer service may expose data store credentials to authorized users of the Windows Registry. Published: April 08, 2024; 7:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-23084 |
Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. Published: April 08, 2024; 7:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-23081 |
ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. Published: April 08, 2024; 7:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-23079 |
JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. Published: April 08, 2024; 7:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-22949 |
JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. Published: April 08, 2024; 7:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-27632 |
An issue in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via the form_id in the form_header() function. Published: April 08, 2024; 6:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-0083 |
NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause a cross-site scripting error by network by running malicious scripts in users' browsers. A successful exploit of this vulnerability might lead to code execution, denial of service, and information disclosure. Published: April 08, 2024; 6:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-0082 |
NVIDIA ChatRTX for Windows contains a vulnerability in the UI, where an attacker can cause improper privilege management by sending open file requests to the application. A successful exploit of this vulnerability might lead to local escalation of privileges, information disclosure, and data tampering Published: April 08, 2024; 6:15:07 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3466 |
A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. Affected by this vulnerability is the function laporan_filter of the file /application/controller/Pengeluaran.php. The manipulation of the argument dari/sampai leads to sql injection. The associated identifier of this vulnerability is VDB-259747. Published: April 08, 2024; 5:15:10 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3465 |
A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been classified as critical. Affected is the function laporan_filter of the file /application/controller/Transaki.php. The manipulation of the argument dari/sampai leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259746 is the identifier assigned to this vulnerability. Published: April 08, 2024; 5:15:10 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-27631 |
Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php Published: April 08, 2024; 5:15:10 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-27630 |
Insecure Direct Object Reference (IDOR) in GNU Savane v.3.12 and before allows a remote attacker to delete arbitrary files via crafted input to the trackers_data_delete_file function. Published: April 08, 2024; 5:15:09 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3464 |
A vulnerability was found in SourceCodester Laundry Management System 1.0 and classified as critical. This issue affects the function laporan_filter of the file /application/controller/Pelanggan.php. The manipulation of the argument jeniskelamin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259745 was assigned to this vulnerability. Published: April 08, 2024; 4:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-3463 |
A vulnerability has been found in SourceCodester Laundry Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /karyawan/edit. The manipulation of the argument karyawan leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259744. Published: April 08, 2024; 4:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-24279 |
An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions. Published: April 08, 2024; 4:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |
CVE-2024-23086 |
Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. Published: April 08, 2024; 4:15:08 PM -0400 |
V3.x:(not available) V2.0:(not available) |